“I am your perfect online partner" analysis of dating profiles used in cybercrime
- Kopp, Christian, Sillitoe, James, Gondal, Iqbal
- Authors: Kopp, Christian , Sillitoe, James , Gondal, Iqbal
- Date: 2017
- Type: Text , Journal article
- Relation: Asia Pacific Journal of Advanced Business and Social Studies Vol. 3, no. 2 (2017), p. 207-217
- Full Text:
- Reviewed:
- Description: Internet Online Dating has become an influential mainstream social practice facilitating the finding of a partner. Unscrupulous operators have identified its potential and started to use this platform for identity theft in form of so called Online Romance Scams. Quickly, this cybercrime has become very successful and thus, an increasing threat in the social networking environment. So far, very little is known about its structure and the reason for its success, and this needs to be known in order to be able to fight it efficiently. This research tries to contribute to this knowledge, and argues that scammers use so-called ‘Love Stories’, which represent personal affinities related to romantic relationships, to their benefit when tailoring common narratives as part of fraudulent online profiles to attract their victims. We look at these different types of ‘Personal Love Stories’ and discuss how they can be used in this type of scam, followed by a qualitative analysis of fraudulent profiles from three different international websites to examine this assumption
- Authors: Kopp, Christian , Sillitoe, James , Gondal, Iqbal
- Date: 2017
- Type: Text , Journal article
- Relation: Asia Pacific Journal of Advanced Business and Social Studies Vol. 3, no. 2 (2017), p. 207-217
- Full Text:
- Reviewed:
- Description: Internet Online Dating has become an influential mainstream social practice facilitating the finding of a partner. Unscrupulous operators have identified its potential and started to use this platform for identity theft in form of so called Online Romance Scams. Quickly, this cybercrime has become very successful and thus, an increasing threat in the social networking environment. So far, very little is known about its structure and the reason for its success, and this needs to be known in order to be able to fight it efficiently. This research tries to contribute to this knowledge, and argues that scammers use so-called ‘Love Stories’, which represent personal affinities related to romantic relationships, to their benefit when tailoring common narratives as part of fraudulent online profiles to attract their victims. We look at these different types of ‘Personal Love Stories’ and discuss how they can be used in this type of scam, followed by a qualitative analysis of fraudulent profiles from three different international websites to examine this assumption
An efficient data extraction framework for mining wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2016
- Type: Text , Conference paper
- Relation: 23rd International Conference, ICONIP 2016; Kyoto, Japan; 16th-21st October 2016; published in Neural Information Processing, Part III (Lecture Notes in Computer Science series) Vol. 9949, p. 491-498
- Full Text:
- Reviewed:
- Description: Behavioral patterns for sensors have received a great deal of attention recently due to their usefulness in capturing the temporal relations between sensors in wireless sensor networks. To discover these patterns, we need to collect the behavioral data that represents the sensor's activities over time from the sensor database that attached with a well-equipped central node called sink for further analysis. However, given the limited resources of sensor nodes, an effective data collection method is required for collecting the behavioral data efficiently. In this paper, we introduce a new framework for behavioral patterns called associated-correlated sensor patterns and also propose a MapReduce based new paradigm for extract data from the wireless sensor network by distributed away. Extensive performance study shows that the proposed method is capable to reduce the data size almost 50% compared to the centralized model.
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2016
- Type: Text , Conference paper
- Relation: 23rd International Conference, ICONIP 2016; Kyoto, Japan; 16th-21st October 2016; published in Neural Information Processing, Part III (Lecture Notes in Computer Science series) Vol. 9949, p. 491-498
- Full Text:
- Reviewed:
- Description: Behavioral patterns for sensors have received a great deal of attention recently due to their usefulness in capturing the temporal relations between sensors in wireless sensor networks. To discover these patterns, we need to collect the behavioral data that represents the sensor's activities over time from the sensor database that attached with a well-equipped central node called sink for further analysis. However, given the limited resources of sensor nodes, an effective data collection method is required for collecting the behavioral data efficiently. In this paper, we introduce a new framework for behavioral patterns called associated-correlated sensor patterns and also propose a MapReduce based new paradigm for extract data from the wireless sensor network by distributed away. Extensive performance study shows that the proposed method is capable to reduce the data size almost 50% compared to the centralized model.
Carry me if you can : A utility based forwarding scheme for content sharing in tourist destinations
- Kaisar, Shahriar, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal
- Authors: Kaisar, Shahriar , Kamruzzaman, Joarder , Karmakar, Gour , Gondal, Iqbal
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 22nd Asia-Pacific Conference on Communications, APCC 2016; Yogyakarta, Indonesia; 25th-27th August 2016 p. 261-267
- Full Text:
- Reviewed:
- Description: Message forwarding is an integral part of the decentralized content sharing process as the content delivery success highly depends on it. Existing literature employs spatio-temporal regularity of human movement pattern and pre-existing social relationship to take message forwarding decisions. However, such approaches are ineffectual in environments where those information are unavailable such as a tourist spot or camping site. In this study, we explore the message forwarding techniques in such environments considering the information that are readily available and can be gathered on the fly. We propose a utility based forwarding scheme to select the appropriate forwarder node based on co-location stay time, connectivity and available resources. A higher co-location stay time reflects that the forwarder and the destination node is likely to have more opportunistic contacts, while the connectivity and available resource ensure that the selected forwarder has sufficient neighbours and resources to carry the message forward. Simulation results suggest that the proposed approach attains high hit and success rate and low latency for successful content delivery, which is comparable to those proposed for work-place type scenarios with regular movement pattern and pre-existing relationships. © 2016 IEEE.
- Authors: Kaisar, Shahriar , Kamruzzaman, Joarder , Karmakar, Gour , Gondal, Iqbal
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 22nd Asia-Pacific Conference on Communications, APCC 2016; Yogyakarta, Indonesia; 25th-27th August 2016 p. 261-267
- Full Text:
- Reviewed:
- Description: Message forwarding is an integral part of the decentralized content sharing process as the content delivery success highly depends on it. Existing literature employs spatio-temporal regularity of human movement pattern and pre-existing social relationship to take message forwarding decisions. However, such approaches are ineffectual in environments where those information are unavailable such as a tourist spot or camping site. In this study, we explore the message forwarding techniques in such environments considering the information that are readily available and can be gathered on the fly. We propose a utility based forwarding scheme to select the appropriate forwarder node based on co-location stay time, connectivity and available resources. A higher co-location stay time reflects that the forwarder and the destination node is likely to have more opportunistic contacts, while the connectivity and available resource ensure that the selected forwarder has sufficient neighbours and resources to carry the message forward. Simulation results suggest that the proposed approach attains high hit and success rate and low latency for successful content delivery, which is comparable to those proposed for work-place type scenarios with regular movement pattern and pre-existing relationships. © 2016 IEEE.
Online romance scam: Expensive e-living for romantic happiness
- Kopp, Christian, Sillitoe, James, Gondal, Iqbal, Layton, Robert
- Authors: Kopp, Christian , Sillitoe, James , Gondal, Iqbal , Layton, Robert
- Date: 2016
- Type: Text , Conference proceedings
- Relation: Proceedings of the 29th Bled eConference: Digital Economy (BLED 2016), Slovenia, pp.175-189 p. 15
- Full Text:
- Description: The Online Romance Scam is a very successful scam which causes considerable financial and emotional damage to its victims. It is based on building a relationship which establishes a deep trust that causes victims to voluntarily transfer funds to the scammer. The aim of this research is to explore online dating scams as a type of e-Living which initially creates happiness for the victim in a virtual romantic relationship, but tragically then causes the victim to be separated from his or her savings. Using narrative research methodology, this research will establish a model of the romance scam structure and its variations regarding human romantic attitudes, and will develop a theory which explains how the victim is moved through the phases of the scam. Findings of this research will contribute to the knowledge of the Online Romance Scam as e-Crime and provide information about the structure and the development of the modus operandi which can be used to identify an online relationship as a scam at an early phase in order to prevent significant harm to the victim.
- Authors: Kopp, Christian , Sillitoe, James , Gondal, Iqbal , Layton, Robert
- Date: 2016
- Type: Text , Conference proceedings
- Relation: Proceedings of the 29th Bled eConference: Digital Economy (BLED 2016), Slovenia, pp.175-189 p. 15
- Full Text:
- Description: The Online Romance Scam is a very successful scam which causes considerable financial and emotional damage to its victims. It is based on building a relationship which establishes a deep trust that causes victims to voluntarily transfer funds to the scammer. The aim of this research is to explore online dating scams as a type of e-Living which initially creates happiness for the victim in a virtual romantic relationship, but tragically then causes the victim to be separated from his or her savings. Using narrative research methodology, this research will establish a model of the romance scam structure and its variations regarding human romantic attitudes, and will develop a theory which explains how the victim is moved through the phases of the scam. Findings of this research will contribute to the knowledge of the Online Romance Scam as e-Crime and provide information about the structure and the development of the modus operandi which can be used to identify an online relationship as a scam at an early phase in order to prevent significant harm to the victim.
The role of love stories in Romance Scams : A qualitative analysis of fraudulent profiles
- Kopp, Christian, Layton, Robert, Sillitoe, Jim, Gondal, Iqbal
- Authors: Kopp, Christian , Layton, Robert , Sillitoe, Jim , Gondal, Iqbal
- Date: 2016
- Type: Text , Journal article
- Relation: International Journal of Cyber Criminology Vol. 9, no. 2 (2016), p. 205-216
- Full Text:
- Reviewed:
- Description: The Online Romance Scam is a very successful scam which causes considerable financial and emotional damage to its victims. In this paper, we provide a perspective that might be helpful to explain the success of this scam. In a similar way to the "The Nigerian letter", we propose that the scam techniques appeal to strong emotions, which are clearly involved in Romantic relationships. We also assume that the same success factors found in normal relationships contribute to the success of the romance scam. In an exploratory study using a qualitative analysis of fraudulent profiles from an international dating website, we examined this assumption. The findings show that personal affinities related to personal romantic imaginations, which are described by personal love stories, play an important role in the success of a romance scam. © 2016 International Journal of Cyber Criminology (IJCC).
- Authors: Kopp, Christian , Layton, Robert , Sillitoe, Jim , Gondal, Iqbal
- Date: 2016
- Type: Text , Journal article
- Relation: International Journal of Cyber Criminology Vol. 9, no. 2 (2016), p. 205-216
- Full Text:
- Reviewed:
- Description: The Online Romance Scam is a very successful scam which causes considerable financial and emotional damage to its victims. In this paper, we provide a perspective that might be helpful to explain the success of this scam. In a similar way to the "The Nigerian letter", we propose that the scam techniques appeal to strong emotions, which are clearly involved in Romantic relationships. We also assume that the same success factors found in normal relationships contribute to the success of the romance scam. In an exploratory study using a qualitative analysis of fraudulent profiles from an international dating website, we examined this assumption. The findings show that personal affinities related to personal romantic imaginations, which are described by personal love stories, play an important role in the success of a romance scam. © 2016 International Journal of Cyber Criminology (IJCC).
Wake-up timer and binary exponential backoff for ZigBee-based wireless sensor network for flexible movement control system of a self-lifting scaffold
- Liang, Hua, Yang, Guangxiang, Xu, Ye, Gondal, Iqbal, Wu, Chao
- Authors: Liang, Hua , Yang, Guangxiang , Xu, Ye , Gondal, Iqbal , Wu, Chao
- Date: 2016
- Type: Text , Journal article
- Relation: International Journal of Distributed Sensor Networks Vol. 12, no. 9 (2016), p. 1-12
- Full Text:
- Reviewed:
- Description: Synchronous movement of attached self-lifting scaffolds is traditionally monitored with wired sensors in high-rise building construction, which limits their flexibility of movements. A ZigBee-based wireless sensor system has been suggested in this article to prove the effectiveness of wireless sensor networks in actual implementation. Two optoelectronic sensors are integrated into a ZigBee node for measuring the displacement of attached self-lifting scaffolds. The proposed wireless sensor network combines an end device and a coordinator to allow easy replacement of sensors as compared to a wired network. A wake-up timer algorithm is proposed to reduce the transmitting power during continuous wireless data communication in the wireless sensor network. Furthermore, a variant binary exponential backoff transmission algorithm for data loss avoidance is proposed. The variant binary exponential backoff algorithm reduces packet collisions during simultaneous access by increasing the randomizing moments at nodes attempting to access the wireless channels. The performance of three of the proposed modules - a cable sensor, a 315-MHz sensor, and a ZigBee sensor - is evaluated in terms of packet delivery ratio and the end-to-end delay of a ZigBee-based wireless sensor network. The experimental results show that the proposed variant binary exponential backoff transmission algorithm achieves a higher packet delivery ratio at the cost of higher delays. The average cost of the developed ZigBee-based wireless sensor network decreased by 24% compared with the cable sensor. The power consumption of ZigBee is approximately 53.75% of the 315-MHz sensor. The average current consumption is reduced by approximately 1.5 mA with the wake-up timer algorithm at the same sampling rate. © The Author(s) 2016.
- Authors: Liang, Hua , Yang, Guangxiang , Xu, Ye , Gondal, Iqbal , Wu, Chao
- Date: 2016
- Type: Text , Journal article
- Relation: International Journal of Distributed Sensor Networks Vol. 12, no. 9 (2016), p. 1-12
- Full Text:
- Reviewed:
- Description: Synchronous movement of attached self-lifting scaffolds is traditionally monitored with wired sensors in high-rise building construction, which limits their flexibility of movements. A ZigBee-based wireless sensor system has been suggested in this article to prove the effectiveness of wireless sensor networks in actual implementation. Two optoelectronic sensors are integrated into a ZigBee node for measuring the displacement of attached self-lifting scaffolds. The proposed wireless sensor network combines an end device and a coordinator to allow easy replacement of sensors as compared to a wired network. A wake-up timer algorithm is proposed to reduce the transmitting power during continuous wireless data communication in the wireless sensor network. Furthermore, a variant binary exponential backoff transmission algorithm for data loss avoidance is proposed. The variant binary exponential backoff algorithm reduces packet collisions during simultaneous access by increasing the randomizing moments at nodes attempting to access the wireless channels. The performance of three of the proposed modules - a cable sensor, a 315-MHz sensor, and a ZigBee sensor - is evaluated in terms of packet delivery ratio and the end-to-end delay of a ZigBee-based wireless sensor network. The experimental results show that the proposed variant binary exponential backoff transmission algorithm achieves a higher packet delivery ratio at the cost of higher delays. The average cost of the developed ZigBee-based wireless sensor network decreased by 24% compared with the cable sensor. The power consumption of ZigBee is approximately 53.75% of the 315-MHz sensor. The average current consumption is reduced by approximately 1.5 mA with the wake-up timer algorithm at the same sampling rate. © The Author(s) 2016.
Teeth Tales : A community-based child oral health promotion trial with migrant families in Australia
- Gibbs, Lisa, Waters, Elizabeth, Christian, Bradley, Gold, Lisa, Young, Dana, De Silva, Andrea, Calache, Hanny, Gussy, Mark, Watt, Richard, Riggs, Elisha, Tadic, Maryanne, Hall, Martin, Gondal, Iqbal, Pradel, Veronika, Moore, Laurence
- Authors: Gibbs, Lisa , Waters, Elizabeth , Christian, Bradley , Gold, Lisa , Young, Dana , De Silva, Andrea , Calache, Hanny , Gussy, Mark , Watt, Richard , Riggs, Elisha , Tadic, Maryanne , Hall, Martin , Gondal, Iqbal , Pradel, Veronika , Moore, Laurence
- Date: 2015
- Type: Text , Journal article
- Relation: BMJ Open Vol. 5, no. 6 (2015), p. 1-13
- Relation: http://purl.org/au-research/grants/arc/LP100100223
- Full Text:
- Reviewed:
- Description: Objectives: The Teeth Tales trial aimed to establish a model for child oral health promotion for culturally diverse communities in Australia. Design: An exploratory trial implementing a communitybased child oral health promotion intervention for Australian families from migrant backgrounds. Mixed method, longitudinal evaluation. Setting: The intervention was based in Moreland, a culturally diverse locality in Melbourne, Australia. Participants: Families with 1-4-year-old children, self-identified as being from Iraqi, Lebanese or Pakistani backgrounds residing in Melbourne. Participants residing close to the intervention site were allocated to intervention. Intervention: The intervention was conducted over 5 months and comprised community oral health education sessions led by peer educators and follow-up health messages. Outcome measures: This paper reports on the intervention impacts, process evaluation and descriptive analysis of health, knowledge and behavioural changes 18 months after baseline data collection. Results: Significant differences in the Debris Index (OR=0.44 (0.22 to 0.88)) and the Modified Gingival Index (OR=0.34 (0.19 to 0.61)) indicated increased tooth brushing and/or improved toothbrushing technique in the intervention group. An increased proportion of intervention parents, compared to those in the comparison group reported that they had been shown how to brush their child's teeth (OR=2.65 (1.49 to 4.69)). Process evaluation results highlighted the problems with recruitment and retention of the study sample (275 complete case families). The child dental screening encouraged involvement in the study, as did linking attendance with other community/cultural activities. Conclusions: The Teeth Tales intervention was promising in terms of improving oral hygiene and parent knowledge of tooth brushing technique. Adaptations to delivery of the intervention are required to increase uptake and likely impact. A future cluster randomised controlled trial would provide strongest evidence of effectiveness if appropriate to the community, cultural and economic context.
Teeth Tales : A community-based child oral health promotion trial with migrant families in Australia
- Authors: Gibbs, Lisa , Waters, Elizabeth , Christian, Bradley , Gold, Lisa , Young, Dana , De Silva, Andrea , Calache, Hanny , Gussy, Mark , Watt, Richard , Riggs, Elisha , Tadic, Maryanne , Hall, Martin , Gondal, Iqbal , Pradel, Veronika , Moore, Laurence
- Date: 2015
- Type: Text , Journal article
- Relation: BMJ Open Vol. 5, no. 6 (2015), p. 1-13
- Relation: http://purl.org/au-research/grants/arc/LP100100223
- Full Text:
- Reviewed:
- Description: Objectives: The Teeth Tales trial aimed to establish a model for child oral health promotion for culturally diverse communities in Australia. Design: An exploratory trial implementing a communitybased child oral health promotion intervention for Australian families from migrant backgrounds. Mixed method, longitudinal evaluation. Setting: The intervention was based in Moreland, a culturally diverse locality in Melbourne, Australia. Participants: Families with 1-4-year-old children, self-identified as being from Iraqi, Lebanese or Pakistani backgrounds residing in Melbourne. Participants residing close to the intervention site were allocated to intervention. Intervention: The intervention was conducted over 5 months and comprised community oral health education sessions led by peer educators and follow-up health messages. Outcome measures: This paper reports on the intervention impacts, process evaluation and descriptive analysis of health, knowledge and behavioural changes 18 months after baseline data collection. Results: Significant differences in the Debris Index (OR=0.44 (0.22 to 0.88)) and the Modified Gingival Index (OR=0.34 (0.19 to 0.61)) indicated increased tooth brushing and/or improved toothbrushing technique in the intervention group. An increased proportion of intervention parents, compared to those in the comparison group reported that they had been shown how to brush their child's teeth (OR=2.65 (1.49 to 4.69)). Process evaluation results highlighted the problems with recruitment and retention of the study sample (275 complete case families). The child dental screening encouraged involvement in the study, as did linking attendance with other community/cultural activities. Conclusions: The Teeth Tales intervention was promising in terms of improving oral hygiene and parent knowledge of tooth brushing technique. Adaptations to delivery of the intervention are required to increase uptake and likely impact. A future cluster randomised controlled trial would provide strongest evidence of effectiveness if appropriate to the community, cultural and economic context.
A technique for parallel share-frequent sensor pattern mining from wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Conference paper
- Relation: 14th Annual International Conference on Computational Science, ICCS 2014; Cairns, Australia; 10th-12th June 2014; published in Procedia Computer Science p. 124-133
- Full Text:
- Reviewed:
- Description: WSNs generate huge amount of data in the form of streams and mining useful knowledge from these streams is a challenging task. Existing works generate sensor association rules using occurrence frequency of patterns with binary frequency (either absent or present) or support of a pattern as a criterion. However, considering the binary frequency or support of a pattern may not be a sufficient indicator for finding meaningful patterns from WSN data because it only reflects the number of epochs in the sensor data which contain that pattern. The share measure of sensorsets could discover useful knowledge about numerical values associated with sensor in a sensor database. Therefore, in this paper, we propose a new type of behavioral pattern called share-frequent sensor patterns by considering the non-binary frequency values of sensors in epochs. To discover share-frequent sensor patterns from sensor dataset, we propose a novel parallel technique. In this technique, we develop a novel tree structure, called parallel share-frequent sensor pattern tree (PShrFSP-tree) that is constructed at each local node independently, by capturing the database contents to generate the candidate patterns using a pattern growth technique with a single scan and then merges the locally generated candidate patterns at the final stage to generate global share-frequent sensor patterns. Comprehensive experimental results show that our proposed model is very efficient for mining share-frequent patterns from WSN data in terms of time and scalability.
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Conference paper
- Relation: 14th Annual International Conference on Computational Science, ICCS 2014; Cairns, Australia; 10th-12th June 2014; published in Procedia Computer Science p. 124-133
- Full Text:
- Reviewed:
- Description: WSNs generate huge amount of data in the form of streams and mining useful knowledge from these streams is a challenging task. Existing works generate sensor association rules using occurrence frequency of patterns with binary frequency (either absent or present) or support of a pattern as a criterion. However, considering the binary frequency or support of a pattern may not be a sufficient indicator for finding meaningful patterns from WSN data because it only reflects the number of epochs in the sensor data which contain that pattern. The share measure of sensorsets could discover useful knowledge about numerical values associated with sensor in a sensor database. Therefore, in this paper, we propose a new type of behavioral pattern called share-frequent sensor patterns by considering the non-binary frequency values of sensors in epochs. To discover share-frequent sensor patterns from sensor dataset, we propose a novel parallel technique. In this technique, we develop a novel tree structure, called parallel share-frequent sensor pattern tree (PShrFSP-tree) that is constructed at each local node independently, by capturing the database contents to generate the candidate patterns using a pattern growth technique with a single scan and then merges the locally generated candidate patterns at the final stage to generate global share-frequent sensor patterns. Comprehensive experimental results show that our proposed model is very efficient for mining share-frequent patterns from WSN data in terms of time and scalability.
An exploratory trial implementing a community-based child oral health promotion intervention for Australian families from refugee and migrant backgrounds : A protocol paper for Teeth Tales
- Gibbs, Lisa, Waters, Elizabeth, De Silva, Andrea, Riggs, Elisha, Moore, Laurence, Armit, Christine, Johnson, Britt, Morris, Michal, Calache, Hanny, Gussy, Mark, Young, Dana, Tadic, Maryanne, Christian, Bradley, Gondal, Iqbal, Watt, Richard, Pradel, Veronika, Truong, Mandy, Gold, Lisa
- Authors: Gibbs, Lisa , Waters, Elizabeth , De Silva, Andrea , Riggs, Elisha , Moore, Laurence , Armit, Christine , Johnson, Britt , Morris, Michal , Calache, Hanny , Gussy, Mark , Young, Dana , Tadic, Maryanne , Christian, Bradley , Gondal, Iqbal , Watt, Richard , Pradel, Veronika , Truong, Mandy , Gold, Lisa
- Date: 2014
- Type: Text , Journal article
- Relation: BMJ Open Vol. 4, no. 3 (2014), p. 1-14
- Full Text:
- Reviewed:
- Description: Introduction: Inequalities are evident in early childhood caries rates with the socially disadvantaged experiencing greater burden of disease. This study builds on formative qualitative research, conducted in the Moreland/Hume local government areas of Melbourne, Victoria 2006-2009, in response to community concerns for oral health of children from refugee and migrant backgrounds. Development of the community-based intervention described here extends the partnership approach to cogeneration of contemporary evidence with continued and meaningful involvement of investigators, community, cultural and government partners. This trial aims to establish a model for child oral health promotion for culturally diverse communities in Australia. Methods and analysis: This is an exploratory trial implementing a community-based child oral health promotion intervention for Australian families from refugee and migrant backgrounds. Families from an Iraqi, Lebanese or Pakistani background with children aged 1-4 years, residing in metropolitan Melbourne, were invited to participate in the trial by peer educators from their respective communities using snowball and purposive sampling techniques. Target sample size was 600. Moreland, a culturally diverse, inner-urban metropolitan area of Melbourne, was chosen as the intervention site. The intervention comprised peer educator led community oral health education sessions and reorienting of dental health and family services through cultural Competency Organisational Review (CORe). Ethics and dissemination: Ethics approval for this trial was granted by the University of Melbourne Human Research Ethics Committee and the Department of Education and Early Childhood Development Research Committee. Study progress and output will be disseminated via periodic newsletters, peer-reviewed research papers, reports, community seminars and at National and International conferences. Trial registration number: Australian New Zealand Clinical Trials Registry (ACTRN12611000532909).
- Authors: Gibbs, Lisa , Waters, Elizabeth , De Silva, Andrea , Riggs, Elisha , Moore, Laurence , Armit, Christine , Johnson, Britt , Morris, Michal , Calache, Hanny , Gussy, Mark , Young, Dana , Tadic, Maryanne , Christian, Bradley , Gondal, Iqbal , Watt, Richard , Pradel, Veronika , Truong, Mandy , Gold, Lisa
- Date: 2014
- Type: Text , Journal article
- Relation: BMJ Open Vol. 4, no. 3 (2014), p. 1-14
- Full Text:
- Reviewed:
- Description: Introduction: Inequalities are evident in early childhood caries rates with the socially disadvantaged experiencing greater burden of disease. This study builds on formative qualitative research, conducted in the Moreland/Hume local government areas of Melbourne, Victoria 2006-2009, in response to community concerns for oral health of children from refugee and migrant backgrounds. Development of the community-based intervention described here extends the partnership approach to cogeneration of contemporary evidence with continued and meaningful involvement of investigators, community, cultural and government partners. This trial aims to establish a model for child oral health promotion for culturally diverse communities in Australia. Methods and analysis: This is an exploratory trial implementing a community-based child oral health promotion intervention for Australian families from refugee and migrant backgrounds. Families from an Iraqi, Lebanese or Pakistani background with children aged 1-4 years, residing in metropolitan Melbourne, were invited to participate in the trial by peer educators from their respective communities using snowball and purposive sampling techniques. Target sample size was 600. Moreland, a culturally diverse, inner-urban metropolitan area of Melbourne, was chosen as the intervention site. The intervention comprised peer educator led community oral health education sessions and reorienting of dental health and family services through cultural Competency Organisational Review (CORe). Ethics and dissemination: Ethics approval for this trial was granted by the University of Melbourne Human Research Ethics Committee and the Department of Education and Early Childhood Development Research Committee. Study progress and output will be disseminated via periodic newsletters, peer-reviewed research papers, reports, community seminars and at National and International conferences. Trial registration number: Australian New Zealand Clinical Trials Registry (ACTRN12611000532909).
A novel vertical handover scheme for diminution in social network traffic
- Haider, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder
- Authors: Haider, Ammar , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2012
- Type: Text , Conference paper
- Full Text:
- Reviewed:
- Authors: Haider, Ammar , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2012
- Type: Text , Conference paper
- Full Text:
- Reviewed:
Inchoate fault detection framework: adaptive selection of wavelet nodes and cumulant orders
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2012
- Type: Text , Journal article
- Relation: IEEE Transactions on Instrumentation and Measurement Vol. 61, no. 3 (2012), p. 685-695
- Full Text:
- Reviewed:
- Description: Inchoate fault detection for machine health monitoring (MHM) demands high level of fault classification accuracy under poor signal-to-noise ratio (SNR) which persists in most industrial environment. Vibration signals are extensively used in signature matching for abnormality detection and diagnosis. In order to guarantee improved performance under poor SNR, feature extraction based on statistical parameters which are immune to Gaussian noise becomes inevitable. This paper proposes a novel framework for adaptive feature extraction based on higher order cumulants (HOCs) and wavelet transform (WT) (AFHCW) for MHM. Features extracted based on HOCs have the tendency to mitigate the impact of Gaussian noise. WT provides better time and frequency domain analysis for the nonstationary signals such as vibration in which spectral contents vary with respect to time. In AFHCW, stationary WT is used to ensure linear processing on the vibration data prior to feature extraction, and it helps in mitigating the impact of poor SNR. K-nearest neighbor classifier is used to categorize the type of the fault. Simulation studies show that the proposed scheme outperforms the existing techniques in terms of classification accuracy under poor SNR.
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2012
- Type: Text , Journal article
- Relation: IEEE Transactions on Instrumentation and Measurement Vol. 61, no. 3 (2012), p. 685-695
- Full Text:
- Reviewed:
- Description: Inchoate fault detection for machine health monitoring (MHM) demands high level of fault classification accuracy under poor signal-to-noise ratio (SNR) which persists in most industrial environment. Vibration signals are extensively used in signature matching for abnormality detection and diagnosis. In order to guarantee improved performance under poor SNR, feature extraction based on statistical parameters which are immune to Gaussian noise becomes inevitable. This paper proposes a novel framework for adaptive feature extraction based on higher order cumulants (HOCs) and wavelet transform (WT) (AFHCW) for MHM. Features extracted based on HOCs have the tendency to mitigate the impact of Gaussian noise. WT provides better time and frequency domain analysis for the nonstationary signals such as vibration in which spectral contents vary with respect to time. In AFHCW, stationary WT is used to ensure linear processing on the vibration data prior to feature extraction, and it helps in mitigating the impact of poor SNR. K-nearest neighbor classifier is used to categorize the type of the fault. Simulation studies show that the proposed scheme outperforms the existing techniques in terms of classification accuracy under poor SNR.
Envelope-Wavelet Packet Transform for Machine Condition Monitoring
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2011
- Type: Text , Conference paper
- Relation: 2011 International Conference on Control, Automation, Robotics and Vision (ICCARV); Venice, Italy; 23rd-25th November 2011; published in Proceedings of the World Academy of Science, Engineering and Technology, International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering Vol. 5, p. 1597-1603
- Full Text:
- Reviewed:
- Description: Wavelet transform has been extensively used in machine fault diagnosis and prognosis owing to its strength to deal with non-stationary signals. The existing Wavelet transform based schemes for fault diagnosis employ wavelet decomposition of the entire vibration frequency which not only involve huge computational overhead in extracting the features but also increases the dimensionality of the feature vector. This increase in the dimensionality has the tendency to 'over-fit' the training data and could mislead the fault diagnostic model. In this paper a novel technique, envelope wavelet packet transform (EWPT) is proposed in which features are extracted based on wavelet packet transform of the filtered envelope signal rather than the overall vibration signal. It not only reduces the computational overhead in terms of reduced number of wavelet decomposition levels and features but also improves the fault detection accuracy. Analytical expressions are provided for the optimal frequency resolution and decomposition level selection in EWPT. Experimental results with both actual and simulated machine fault data demonstrate significant gain in fault detection ability by EWPT at reduced complexity compared to existing techniques.
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2011
- Type: Text , Conference paper
- Relation: 2011 International Conference on Control, Automation, Robotics and Vision (ICCARV); Venice, Italy; 23rd-25th November 2011; published in Proceedings of the World Academy of Science, Engineering and Technology, International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering Vol. 5, p. 1597-1603
- Full Text:
- Reviewed:
- Description: Wavelet transform has been extensively used in machine fault diagnosis and prognosis owing to its strength to deal with non-stationary signals. The existing Wavelet transform based schemes for fault diagnosis employ wavelet decomposition of the entire vibration frequency which not only involve huge computational overhead in extracting the features but also increases the dimensionality of the feature vector. This increase in the dimensionality has the tendency to 'over-fit' the training data and could mislead the fault diagnostic model. In this paper a novel technique, envelope wavelet packet transform (EWPT) is proposed in which features are extracted based on wavelet packet transform of the filtered envelope signal rather than the overall vibration signal. It not only reduces the computational overhead in terms of reduced number of wavelet decomposition levels and features but also improves the fault detection accuracy. Analytical expressions are provided for the optimal frequency resolution and decomposition level selection in EWPT. Experimental results with both actual and simulated machine fault data demonstrate significant gain in fault detection ability by EWPT at reduced complexity compared to existing techniques.
Multiple-points fault signature's dynamics modeling for bearing defect frequencies
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2011
- Type: Text , Conference paper
- Relation: 2011 International Conference on Control, Automation, Robotics and Vision (ICCARV); Venice, Italy; 23rd-25th November 2011; published in Proceedings of the World Academy of Science, Engineering and Technology, International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering Vol. 5, p. 2548-2553
- Full Text:
- Reviewed:
- Description: Occurrence of a multiple-points fault in machine operations could result in exhibiting complex fault signatures, which could result in lowering fault diagnosis accuracy. In this study, a multiple-points defect model (MPDM) is proposed which can simulate fault signature-s dynamics for n-points bearing faults. Furthermore, this study identifies that in case of multiple-points fault in the rotary machine, the location of the dominant component of defect frequency shifts depending upon the relative location of the fault points which could mislead the fault diagnostic model to inaccurate detections. Analytical and experimental results are presented to characterize and validate the variation in the dominant component of defect frequency. Based on envelop detection analysis, a modification is recommended in the existing fault diagnostic models to consider the multiples of defect frequency rather than only considering the frequency spectrum at the defect frequency in order to incorporate the impact of multiple points fault.
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2011
- Type: Text , Conference paper
- Relation: 2011 International Conference on Control, Automation, Robotics and Vision (ICCARV); Venice, Italy; 23rd-25th November 2011; published in Proceedings of the World Academy of Science, Engineering and Technology, International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering Vol. 5, p. 2548-2553
- Full Text:
- Reviewed:
- Description: Occurrence of a multiple-points fault in machine operations could result in exhibiting complex fault signatures, which could result in lowering fault diagnosis accuracy. In this study, a multiple-points defect model (MPDM) is proposed which can simulate fault signature-s dynamics for n-points bearing faults. Furthermore, this study identifies that in case of multiple-points fault in the rotary machine, the location of the dominant component of defect frequency shifts depending upon the relative location of the fault points which could mislead the fault diagnostic model to inaccurate detections. Analytical and experimental results are presented to characterize and validate the variation in the dominant component of defect frequency. Based on envelop detection analysis, a modification is recommended in the existing fault diagnostic models to consider the multiples of defect frequency rather than only considering the frequency spectrum at the defect frequency in order to incorporate the impact of multiple points fault.
Optimally parameterized wavelet packet transform for machine residual life prediction
- Gondal, Iqbal, Yaqub, Muhammad, Kamruzzaman, Joarder
- Authors: Gondal, Iqbal , Yaqub, Muhammad , Kamruzzaman, Joarder
- Date: 2011
- Type: Text , Conference paper , Journal article
- Relation: Australian Acoustical SocietyConference 2011: Breaking New Ground, Acoustics 2011; Gold Coast, Australia; 2nd-4th November 2011; p.1-8
- Full Text:
- Reviewed:
- Description: One of the prevalent issues in condition based maintenance (CBM) is to predict the residual life of the equipment. This paper propos-es a novel framework to predict the remnant life of the equipment, called Residual life prediction based on optimally parameterized Wavelet transform and Mute-step Support vector regression (RWMS). In optimally parameterized wavelet transform, a generalized criterion is proposed to select the wavelet decomposition level which works for all the applications and decomposition nodes are selected by characterizing their dominancy level based upon relative fault signature-signal energy contents. The prediction model is based on multi-step support vector regression (MSVR) and prediction accuracy is improved in comparison with the techniques based on support vector regression (SVR). Performance of RWMS is evaluated in terms of Root Means Square Error (RMSE), studies show that proposed algorithm predicts the residual life of the equipment accurately.
- Authors: Gondal, Iqbal , Yaqub, Muhammad , Kamruzzaman, Joarder
- Date: 2011
- Type: Text , Conference paper , Journal article
- Relation: Australian Acoustical SocietyConference 2011: Breaking New Ground, Acoustics 2011; Gold Coast, Australia; 2nd-4th November 2011; p.1-8
- Full Text:
- Reviewed:
- Description: One of the prevalent issues in condition based maintenance (CBM) is to predict the residual life of the equipment. This paper propos-es a novel framework to predict the remnant life of the equipment, called Residual life prediction based on optimally parameterized Wavelet transform and Mute-step Support vector regression (RWMS). In optimally parameterized wavelet transform, a generalized criterion is proposed to select the wavelet decomposition level which works for all the applications and decomposition nodes are selected by characterizing their dominancy level based upon relative fault signature-signal energy contents. The prediction model is based on multi-step support vector regression (MSVR) and prediction accuracy is improved in comparison with the techniques based on support vector regression (SVR). Performance of RWMS is evaluated in terms of Root Means Square Error (RMSE), studies show that proposed algorithm predicts the residual life of the equipment accurately.
A cross-layer approach for QoS topology control in wireless ad hoc networks
- Rokonuzzaman, S. K., Pose, Ronald, Gondal, Iqbal
- Authors: Rokonuzzaman, S. K. , Pose, Ronald , Gondal, Iqbal
- Date: 2009
- Type: Text , Conference paper
- Relation: TENCON 2009 - 2009 IEEE Region 10 Conference
- Full Text:
- Reviewed:
- Description: Wireless ad hoc networks using omni-directional antennas do not scale well due to interference between nearby nodes. Maintaining the QoS of the communications in this type of network is a difficult task. Using multiple narrow beam directional antennas alleviates this problem at the expense of connectivity. Multi-beam smart antennas allow the network topology to be adjusted dynamically by adjusting the beamwidth and beam directions to minimize interference and to maximize the number of possible concurrent network communications. This in turn helps to maintain the QoS of the communications. QoS routing has long been used to meet the user requirements by finding appropriate paths to the destinations. We extend this concept to create an adaptive QoS topology control (AQTC) system using smart antennas. We use a cross-layer approach to control the topology dynamically where the topology control layer sits between the MAC and the routing protocol. The performance of our protocol has been evaluated using extensive simulations. Simulation results show that different topologies for a set of communications perform differently. AQTC always forms a topology to facilitate the current communications and improves the network throughput and end-to-end delay.
- Authors: Rokonuzzaman, S. K. , Pose, Ronald , Gondal, Iqbal
- Date: 2009
- Type: Text , Conference paper
- Relation: TENCON 2009 - 2009 IEEE Region 10 Conference
- Full Text:
- Reviewed:
- Description: Wireless ad hoc networks using omni-directional antennas do not scale well due to interference between nearby nodes. Maintaining the QoS of the communications in this type of network is a difficult task. Using multiple narrow beam directional antennas alleviates this problem at the expense of connectivity. Multi-beam smart antennas allow the network topology to be adjusted dynamically by adjusting the beamwidth and beam directions to minimize interference and to maximize the number of possible concurrent network communications. This in turn helps to maintain the QoS of the communications. QoS routing has long been used to meet the user requirements by finding appropriate paths to the destinations. We extend this concept to create an adaptive QoS topology control (AQTC) system using smart antennas. We use a cross-layer approach to control the topology dynamically where the topology control layer sits between the MAC and the routing protocol. The performance of our protocol has been evaluated using extensive simulations. Simulation results show that different topologies for a set of communications perform differently. AQTC always forms a topology to facilitate the current communications and improves the network throughput and end-to-end delay.
How to improve postgenomic knowledge discovery using imputation
- Sehgal, Muhammad Shoaib B, Gondal, Iqbal, Dooley, Laurence, Coppel, Ross
- Authors: Sehgal, Muhammad Shoaib B , Gondal, Iqbal , Dooley, Laurence , Coppel, Ross
- Date: 2009
- Type: Text , Journal article
- Relation: Eurasip Journal on Bioinformatics and Systems Biology Vol. 2009, no. 1 (2009), p. 1-14
- Full Text:
- Reviewed:
- Description: While microarrays make it feasible to rapidly investigate many complex biological problems, their multistep fabrication has the proclivity for error at every stage. The standard tactic has been to either ignore or regard erroneous gene readings as missing values, though this assumption can exert a major influence upon postgenomic knowledge discovery methods like gene selection and gene regulatory network (GRN) reconstruction. This has been the catalyst for a raft of new flexible imputation algorithms including local least square impute and the recent heuristic collateral missing value imputation, which exploit the biological transactional behaviour of functionally correlated genes to afford accurate missing value estimation. This paper examines the influence of missing value imputation techniques upon postgenomic knowledge inference methods with results for various algorithms consistently corroborating that instead of ignoring missing values, recycling microarray data by flexible and robust imputation can provide substantial performance benefits for subsequent downstream procedures
- Authors: Sehgal, Muhammad Shoaib B , Gondal, Iqbal , Dooley, Laurence , Coppel, Ross
- Date: 2009
- Type: Text , Journal article
- Relation: Eurasip Journal on Bioinformatics and Systems Biology Vol. 2009, no. 1 (2009), p. 1-14
- Full Text:
- Reviewed:
- Description: While microarrays make it feasible to rapidly investigate many complex biological problems, their multistep fabrication has the proclivity for error at every stage. The standard tactic has been to either ignore or regard erroneous gene readings as missing values, though this assumption can exert a major influence upon postgenomic knowledge discovery methods like gene selection and gene regulatory network (GRN) reconstruction. This has been the catalyst for a raft of new flexible imputation algorithms including local least square impute and the recent heuristic collateral missing value imputation, which exploit the biological transactional behaviour of functionally correlated genes to afford accurate missing value estimation. This paper examines the influence of missing value imputation techniques upon postgenomic knowledge inference methods with results for various algorithms consistently corroborating that instead of ignoring missing values, recycling microarray data by flexible and robust imputation can provide substantial performance benefits for subsequent downstream procedures
Computational modelling strategies for gene regulatory network reconstruction
- Sehgal, Muhammad Shoaib B, Gondal, Iqbal, Dooley, Laurence
- Authors: Sehgal, Muhammad Shoaib B , Gondal, Iqbal , Dooley, Laurence
- Date: 2008
- Type: Text , Book chapter
- Relation: Studies in Computational Intelligence p. 207-220
- Full Text:
- Reviewed:
- Description: Gene Regulatory Network (GRN) modelling infers genetic interactions between different genes and other cellular components to elucidate the cellular functionality. This GRN modelling has overwhelming applications in biology starting from diagnosis through to drug target identification. Several GRN modelling methods have been proposed in the literature, and it is important to study the relative merits and demerits of each method. This chapter provides a comprehensive comparative study on GRN reconstruction algorithms. The methods discussed in this chapter are diverse and vary from simple similarity based methods to state of the art hybrid and probabilistic methods. In addition, the chapter also underpins the need of strategies which should be able to model the stochastic behavior of gene regulation in the presence of limited number of samples, noisy data, multi-collinearity for high number of genes.
- Authors: Sehgal, Muhammad Shoaib B , Gondal, Iqbal , Dooley, Laurence
- Date: 2008
- Type: Text , Book chapter
- Relation: Studies in Computational Intelligence p. 207-220
- Full Text:
- Reviewed:
- Description: Gene Regulatory Network (GRN) modelling infers genetic interactions between different genes and other cellular components to elucidate the cellular functionality. This GRN modelling has overwhelming applications in biology starting from diagnosis through to drug target identification. Several GRN modelling methods have been proposed in the literature, and it is important to study the relative merits and demerits of each method. This chapter provides a comprehensive comparative study on GRN reconstruction algorithms. The methods discussed in this chapter are diverse and vary from simple similarity based methods to state of the art hybrid and probabilistic methods. In addition, the chapter also underpins the need of strategies which should be able to model the stochastic behavior of gene regulation in the presence of limited number of samples, noisy data, multi-collinearity for high number of genes.
Heuristic non parametric collateral missing value imputation : A step towards robust post-genomic knowledge discovery
- Sehgal, Muhammad Shoaib B, Gondal, Iqbal, Dooley, Laurence, Coppel, Ross
- Authors: Sehgal, Muhammad Shoaib B , Gondal, Iqbal , Dooley, Laurence , Coppel, Ross
- Date: 2008
- Type: Text , Conference paper
- Relation: Third IAPR International Conference on Pattern Recognition in Bioinformatics (PRIB 2008) Vol. 5625
- Full Text:
- Reviewed:
- Description: Microarrays are able to measure the patterns of expression of thousands of genes in a genometo give profiles that faciliate much faster analysis of biological process for diagnosis, prognosis and tailored drug discovery. Microarrays, however commonly have missing values, various algorithms have been proposed including Collateral Missing Value Estimation (CMVE), Bayesian Principal Component Analysis (BPCA), Least Square Impute (LSImpute). Local Least Square Impute (LLSImpute) and K-Nearest Neighbour (KNN).
- Authors: Sehgal, Muhammad Shoaib B , Gondal, Iqbal , Dooley, Laurence , Coppel, Ross
- Date: 2008
- Type: Text , Conference paper
- Relation: Third IAPR International Conference on Pattern Recognition in Bioinformatics (PRIB 2008) Vol. 5625
- Full Text:
- Reviewed:
- Description: Microarrays are able to measure the patterns of expression of thousands of genes in a genometo give profiles that faciliate much faster analysis of biological process for diagnosis, prognosis and tailored drug discovery. Microarrays, however commonly have missing values, various algorithms have been proposed including Collateral Missing Value Estimation (CMVE), Bayesian Principal Component Analysis (BPCA), Least Square Impute (LSImpute). Local Least Square Impute (LLSImpute) and K-Nearest Neighbour (KNN).