ORCID Profile
0000-0003-0230-1432
Current Organisations
Murdoch University
,
University of New South Wales Canberra at ADFA
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Computer System Security | Artificial Intelligence and Image Processing | Pattern Recognition and Data Mining | Networking and Communications | Artificial Intelligence and Image Processing not elsewhere classified | Distributed Computing | Computer Software | Information Systems | Computer Vision | Image Processing | Information Storage, Retrieval And Management | Image Processing | Information Systems Management | Business and Management | Interdisciplinary Engineering Not Elsewhere Classified | Electronic Commerce | Data Security | Global Information Systems | Pattern Recognition | Database Management
Application Tools and System Utilities | Application tools and system utilities | Application packages | Information processing services | Communication Networks and Services not elsewhere classified | National Security | Application Software Packages (excl. Computer Games) | Computer Software and Services not elsewhere classified | Law Enforcement | Energy Services and Utilities | Other | Communication services not elsewhere classified | Computer software and services not elsewhere classified | Electronic Information Storage and Retrieval Services | Expanding Knowledge in the Information and Computing Sciences | Commercial security services |
Publisher: Elsevier BV
Date: 09-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2023
Publisher: Elsevier BV
Date: 10-2010
Publisher: Elsevier BV
Date: 2021
Publisher: IEEE
Date: 2004
Publisher: IEEE
Date: 06-2010
Publisher: Copernicus GmbH
Date: 03-08-2020
DOI: 10.5194/ISPRS-ANNALS-V-2-2020-941-2020
Abstract: Abstract. With new accessibility to satellite videos, retrieving the dynamic information of moving objects over a vast territory becomes possible with the development of advanced video processing and machine learning techniques. Detecting moving objects can be based on the structures of both background and foreground of a satellite video, and the background is assumed to lay in a low dimensional subspace. As the moving objects in satellite videos are groups of neighbouring pixels other than isolated pixels, Low-rank and Structured Sparse Decomposition (LSD) with structured sparsity regularization on the foreground can suppress the false alarms caused by isolated outliers. However, in LSD, the groups of neighbouring pixels are extracted by a fixed sliding window over each video frame, which ignores the coherence on the appearance of a moving object. For ex le, a moving object can be in an irregular shape and arbitrary orientation. In this paper, we argue that the spatial groups on the foreground can be defined using the concept of superpixels, where each superpixel is formed by a group of spatially connected similar pixels obtained from over-segmentation. We conduct low-rank matrix decomposition at superpixel level, which is named as Superpixel-based LSD (S-LSD). To handle the variation in moving objects, we combine the superpixels at a range of scales in the superpixel-based spatial regularization on the foreground. With the reduction in the number of spatial groups, S-LSD presents reduced computation complexity. The results on two satellite videos show a satisfactory performance with a significant saving in processing time when the proposed S-LSD approach is applied.
Publisher: IEEE
Date: 06-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Wiley
Date: 18-07-2016
DOI: 10.1002/WCM.2488
Publisher: Elsevier BV
Date: 07-2011
Publisher: MDPI AG
Date: 21-12-2022
DOI: 10.3390/S23010062
Abstract: Deep learning has become a predominant method for solving data analysis problems in virtually all fields of science and engineering. The increasing complexity and the large volume of data collected by erse sensor systems have spurred the development of deep learning methods and have fundamentally transformed the way the data are acquired, processed, analyzed, and interpreted. With the rapid development of deep learning technology and its ever-increasing range of successful applications across erse sensor systems, there is an urgent need to provide a comprehensive investigation of deep learning in this domain from a holistic view. This survey paper aims to contribute to this by systematically investigating deep learning models/methods and their applications across erse sensor systems. It also provides a comprehensive summary of deep learning implementation tips and links to tutorials, open-source codes, and pretrained models, which can serve as an excellent self-contained reference for deep learning practitioners and those seeking to innovate deep learning in this space. In addition, this paper provides insights into research topics in erse sensor systems where deep learning has not yet been well-developed, and highlights challenges and future opportunities. This survey serves as a catalyst to accelerate the application and transformation of deep learning in erse sensor systems.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2021
Publisher: Elsevier BV
Date: 09-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2023
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: Springer Science and Business Media LLC
Date: 14-06-2016
Publisher: IEEE
Date: 06-2010
Publisher: IEEE
Date: 2005
DOI: 10.1109/LCN.2005.91
Publisher: Institution of Engineering and Technology (IET)
Date: 02-2015
DOI: 10.1049/EL.2014.4182
Publisher: Springer International Publishing
Date: 2016
Publisher: Springer International Publishing
Date: 2018
Publisher: Springer International Publishing
Date: 2018
Publisher: IEEE
Date: 06-2015
Publisher: IEEE
Date: 2008
DOI: 10.1109/ICC.2008.301
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2016
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2015
Publisher: IEEE
Date: 06-2015
Publisher: IEEE
Date: 06-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2017
Publisher: Physical Society of Japan
Date: 15-02-2017
Publisher: MDPI AG
Date: 07-07-2022
DOI: 10.3390/S22145111
Abstract: Cognitive biometrics is an emerging branch of biometric technology. Recent research has demonstrated great potential for using cognitive biometrics in versatile applications, including biometric recognition and cognitive and emotional state recognition. There is a major need to summarize the latest developments in this field. Existing surveys have mainly focused on a small subset of cognitive biometric modalities, such as EEG and ECG. This article provides a comprehensive review of cognitive biometrics, covering all the major biosignal modalities and applications. A taxonomy is designed to structure the corresponding knowledge and guide the survey from signal acquisition and pre-processing to representation learning and pattern recognition. We provide a unified view of the methodological advances in these four aspects across various biosignals and applications, facilitating interdisciplinary research and knowledge transfer across fields. Furthermore, this article discusses open research directions in cognitive biometrics and proposes future prospects for developing reliable and secure cognitive biometric systems.
Publisher: Elsevier BV
Date: 06-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2019
Publisher: IEEE
Date: 06-2011
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Springer International Publishing
Date: 2015
Publisher: Elsevier BV
Date: 02-2019
Publisher: Elsevier BV
Date: 12-2018
DOI: 10.1016/J.SCITOTENV.2018.07.024
Abstract: Wastewater recycling is an increasingly popular option in worldwide to reduce pressure on water supplies due to population growth and climate change. Cryptosporidium spp. are among the most common parasites found in wastewater and understanding the prevalence of human-infectious species is essential for accurate quantitative microbial risk assessment (QMRA) and cost-effective management of wastewater. The present study conducted next generation sequencing (NGS) to determine the prevalence and ersity of Cryptosporidium species in 730 raw influent s les from 25 Australian wastewater treatment plants (WWTPs) across three states: New South Wales (NSW), Queensland (QLD) and Western Australia (WA), between 2014 and 2015. All s les were screened for the presence of Cryptosporidium at the 18S rRNA (18S) locus using quantitative PCR (qPCR), oocyst numbers were determined directly from the qPCR data using DNA standards calibrated by droplet digital PCR, and positives were characterized using NGS of 18S licons. Positives were also screened using C. parvum and C. hominis specific qPCRs. The overall Cryptosporidium prevalence was 11.4% (83/730): 14.3% (3/21) in NSW 10.8% (51/470) in QLD and 12.1% (29/239) in WA. A total of 17 Cryptosporidium species and six genotypes were detected by NGS. In NSW, C. hominis and Cryptosporidium rat genotype III were the most prevalent species (9.5% each). In QLD, C. galli, C. muris and C. parvum were the three most prevalent species (7.7%, 5.7%, and 4.5%, respectively), while in WA, C. meleagridis was the most prevalent species (6.3%). The oocyst load/Litre ranged from 70 to 18,055 oocysts/L (overall mean of 3426 oocysts/L: 4746 oocysts/L in NSW 3578 oocysts/L in QLD and 3292 oocysts/L in WA). NGS-based profiling demonstrated that Cryptosporidium is prevalent in the raw influent across Australia and revealed a large ersity of Cryptosporidium species and genotypes, which indicates the potential contribution of livestock, wildlife and birds to wastewater contamination.
Publisher: IEEE
Date: 11-2005
Publisher: Springer Science and Business Media LLC
Date: 28-06-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2014
Publisher: Elsevier BV
Date: 07-2011
Publisher: IEEE
Date: 09-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: IEEE
Date: 07-2018
Publisher: IEEE
Date: 12-2018
Publisher: Elsevier BV
Date: 02-2018
DOI: 10.1016/J.TTBDIS.2017.12.011
Abstract: Worldwide, Ehrlichia spp. are emerging infectious organisms of domestic animals and people, however, most Ehrlichia spp. naturally infect wildlife reservoirs causing mainly asymptomatic infections. Australian ecosystems have been under-explored for these potentially pathogenic organisms, and recent studies have identified a range of novel Ehrlichia, and their sister genera, Anaplasma and 'Candidatus Neoehrlichia' species, from native Australian ticks. We used bacterial 16S rRNA (16S) next-generation sequencing and genus-specific PCR to profile the bacterial communities in platypus (Ornithorhynchus anatinus) blood s les and platypus ticks (Ixodes ornithorhynchi), and identified a high prevalence of Ehrlichia sequences. We also observed Ehrlichia-like intra-neutrophilic inclusions (morulae) in PCR-positive stained platypus blood films that were consistent in morphology with other Ehrlichia spp. Bayesian phylogenetic analysis of 16S (1343 bp), gltA (1004 bp), and groEL (1074 bp) gene sequences group the platypus Ehrlichia with 'Candidatus Ehrlichia khabarensis' from far-eastern Russia, and demonstrate that the platypus Ehrlichia is clearly distinct from all other Ehrlichia spp. Enough genetic ergence exists to delineate this platypus Ehrlichia as a separate species that we propose to designate 'Candidatus Ehrlichia ornithorhynchi'. There is no evidence that 'Candidatus Ehrlichia ornithorhynchi' causes disease in wild platypuses, however, the organism does seem to be widespread in Australia, being found in both Queensland and Tasmania. 'Candidatus Ehrlichia ornithorhynchi' is the second native Australian Ehrlichia described and adds to the rapidly growing ersity of recently described native Australian tick-borne bacteria.
Publisher: SPIE
Date: 16-03-2008
DOI: 10.1117/12.778651
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2019
Publisher: Public Library of Science (PLoS)
Date: 04-06-2012
Publisher: Public Library of Science (PLoS)
Date: 14-12-2016
Publisher: Springer Science and Business Media LLC
Date: 28-10-2021
DOI: 10.1007/S11686-021-00482-5
Abstract: There is a dearth of research conducted on the Knowledge, Attitude and Practices (KAP) of swimming pool patrons and staff to determine their understanding of the importance of Cryptosporidium and its transmission in swimming pools. We conducted a KAP survey of public swimming pool patrons (n = 380) and staff (n = 40) attending five public swimming pools in Western Australia (WA). Knowledge, attitudes and practices (KAP) of Cryptosporidium varied between patrons and staff but were generally limited. Only 26.1% and 25.0% of patrons and staff had heard of Cryptosporidium, while 17.4% and 10.0% knew that it causes diarrhoea, respectively. Thirty-one percent of patrons were aware of their pool policy concerning gastroenteritis and Cryptosporidium, compared to 62.5% of staff. Less than 50% of patrons demonstrated awareness of how features within the pool environment were relevant to the control of Cryptosporidium. Only about a third of patrons (35%) and staff (37.5%) were aware that showering before swimming reduced the risk of gastroenteritis. Raising awareness about hygiene-related practices through the delivery of targeted health education messages to the general public is essential to reduce the burden of Cryptosporidium infections in aquatic environments.
Publisher: IEEE
Date: 12-2018
Publisher: Elsevier BV
Date: 07-2020
Publisher: IEEE
Date: 2003
Publisher: IEEE
Date: 12-2017
Publisher: MDPI AG
Date: 28-01-2019
DOI: 10.3390/SYM11020141
Abstract: Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper.
Publisher: Elsevier BV
Date: 2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: IEEE
Date: 04-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: IEEE
Date: 06-2016
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Elsevier BV
Date: 02-2007
Publisher: IEEE
Date: 11-2006
Publisher: IEEE
Date: 06-2016
Publisher: Elsevier BV
Date: 06-2018
Publisher: Wiley
Date: 26-01-2012
DOI: 10.1002/WCM.1247
Publisher: IEEE
Date: 09-2010
DOI: 10.1109/NSS.2010.5
Publisher: IEEE
Date: 06-2016
Publisher: Elsevier BV
Date: 11-2019
Publisher: IEEE
Date: 12-2011
DOI: 10.1109/DASC.2011.46
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Elsevier BV
Date: 02-2007
Publisher: IEEE
Date: 06-2008
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 12-2011
Publisher: MDPI AG
Date: 22-07-2016
DOI: 10.3390/FI8030034
Publisher: Wiley
Date: 27-10-2016
DOI: 10.1002/SEC.1664
Publisher: IEEE
Date: 04-2013
Publisher: SAGE Publications
Date: 08-2015
DOI: 10.1155/2015/352761
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2018
Publisher: Wiley
Date: 17-01-2021
DOI: 10.1111/ZPH.12806
Publisher: Wiley
Date: 28-07-2012
DOI: 10.1002/CPE.1797
Publisher: Elsevier BV
Date: 2022
DOI: 10.1016/J.TTBDIS.2021.101873
Abstract: Ticks are haematophagous arthropods that parasitise a wide range of vertebrate hosts. In Australia, there are currently 74 tick species described 22 tick species have been reported parasitising humans. The stump-tailed lizard tick, Amblyomma albolimbatum, feeds on reptiles, most commonly lizards and snakes however, we report the first case of A. albolimbatum parasitising a human. The nymphal tick was removed while conducting fieldwork on western tiger snakes (Notechis scutatus occidentalis) in an urban city environment near Perth, Western Australia. The tick was identified using morphological descriptions, which was further supported by the abundance of all parasitic stages of A. albolimbatum on the tiger snakes s led. The number of tick species recorded from humans in Australia is now revised to 23 species. With the increasing incidence of tick-borne illnesses in Australia, this study highlights the need to report cases of new or atypical hosts, particularly humans, and especially when the ticks have been associated with zoonotic pathogens.
Publisher: Elsevier BV
Date: 2017
Publisher: IEEE
Date: 07-2018
Publisher: Elsevier BV
Date: 11-2009
Publisher: Elsevier BV
Date: 03-2000
Publisher: Frontiers Media SA
Date: 09-10-2018
Publisher: Elsevier BV
Date: 08-2017
Publisher: Microbiology Society
Date: 05-2020
Abstract: Rejection ( nomen rejiciendum ) of the name Borreliella and all new combinations therein is being requested on grounds of risk to human health and patient safety (Principle 1, subprinciple 2 and Rule 56a) and violation to aim for stability of names, to avoid useless creation of names (Principle 1, subprinciple 1 and 3) and that names should not be changed without sufficient reason (Principle 9 of the International Code of Nomenclature of Prokaryotes).
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2016
Publisher: IEEE
Date: 05-2009
Publisher: IEEE
Date: 06-2012
Publisher: IEEE
Date: 08-2014
Publisher: MDPI AG
Date: 28-01-2015
DOI: 10.3390/S150202812
Publisher: Elsevier BV
Date: 07-2010
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2016
Publisher: IEEE
Date: 11-2005
Publisher: Springer Nature Singapore
Date: 2022
Publisher: IEEE
Date: 2005
DOI: 10.1109/LCN.2005.117
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2013
Publisher: IEEE
Date: 03-2016
Publisher: Elsevier BV
Date: 02-2018
DOI: 10.1016/J.TTBDIS.2017.12.007
Abstract: Lyme borreliosis (or Lyme Disease) is an emerging threat to human health in the Northern Hemisphere caused by tick-borne bacteria from the Borrelia burgdorferi sensu lato (Bbsl) complex. Seabirds are important reservoir hosts of some members of the Bbsl complex in the Northern Hemisphere, and some evidence suggests this may be true of penguins in the Southern Hemisphere. While the Bbsl complex has not been detected in Australia, a novel Borrelia species ('Candidatus Borrelia tachyglossi') was recently sequenced from native ticks (Ixodes holocyclus and Bothriocroton concolor) parasitising echidnas (Tachyglossus aculeatus), suggesting unidentified borreliae may be circulating amongst native wildlife and their ticks. In the present study, we investigated whether ticks parasitising little penguins (Eudyptula novaehollandiae) harbour native or introduced Borrelia bacteria. We chose this penguin species because it is heavily exploited by ticks during the breeding season, lives in close proximity to other potential reservoir hosts (including native wildlife and migratory seabirds), and is known to be infected with other tick-borne pathogens (Babesia). We screened over 230 penguin ticks (Ixodes spp.) from colonies in south-eastern Australia, and found no evidence of Borrelia DNA. The apparent absence or rarity of the bacterium in south-eastern Australia has important implications for identifying potential tick-borne pathogens in an understudied region.
Publisher: Elsevier BV
Date: 11-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2022
Publisher: Elsevier BV
Date: 09-2017
DOI: 10.1016/J.IJPARA.2017.03.003
Abstract: The extent of within-host genetic ersity of parasites has implications for our understanding of the epidemiology, disease severity and evolution of parasite virulence. As with many other species, our understanding of the within-host ersity of the enteric parasite Cryptosporidium is changing. The present study compared Sanger and Next Generation Sequencing of glycoprotein 60 (gp60) licons from Cryptosporidium hominis (n=11), Cryptosporidium parvum (n=22) and Cryptosporidium cuniculus (n=8) DNA s les from Australia and China. Sanger sequencing identified only one gp60 subtype in each DNA s le: one C. hominis subtype (IbA10G2) (n=11), four C. parvum subtypes belonging to IIa (n=3) and IId (n=19) and one C. cuniculus subtype (VbA23) (n=8). Next Generation Sequencing identified the same subtypes initially identified by Sanger sequencing, but also identified additional gp60 subtypes in C. parvum and C. cuniculus but not in C. hominis, DNA s les. The number of C. parvum and C. cuniculus subtypes identified by Next Generation Sequencing within in idual DNA s les ranged from two to four, and both C. parvum IIa and IId subtype families were identified within the one host in two s les. The finding of the present study has important implications for Cryptosporidium transmission tracking as well as vaccine and drug studies.
Publisher: IEEE
Date: 2005
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2018
Publisher: IEEE
Date: 06-2015
Publisher: Elsevier BV
Date: 11-2014
Publisher: Elsevier BV
Date: 02-2012
Publisher: Wiley
Date: 15-03-2013
DOI: 10.1002/WCM.1109
Publisher: MDPI AG
Date: 06-07-2019
DOI: 10.3390/S19132985
Abstract: Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique—steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques.
Publisher: CSIRO Publishing
Date: 2020
DOI: 10.1071/WR19079
Publisher: Oxford University Press (OUP)
Date: 27-03-2012
Publisher: Elsevier
Date: 2008
Publisher: Elsevier BV
Date: 10-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2013
Publisher: IEEE
Date: 07-2018
Publisher: CSIRO Publishing
Date: 2018
DOI: 10.1071/MA18069
Abstract: Coxiellaburnetii is the causative agent of coxiellosis in animals and Q fever in humans. Despite being a vaccine preventable disease, Q fever remains a frequently reported zoonotic infection in Australia. Recently, a Coxiella species was identified in brown dog ticks (Rhipicephalus sanguineus) in urban and rural regions of Australia. Further molecular characterisation revealed that it is genetically identical to ‘Candidatus Coxiella massiliensis’ (KM079627) described in R. sanguineus ticks removed from humans with eschars in France and serologic cross-reactivity among ‘Ca. Coxiella massiliensis’ and C.burnetii may occur. This report highlights the need for molecular testing of seropositive companion animals and humans to determine which species of Coxiella they are infected with, in order to further assess Coxiella species associated with Coxiella infections in Australia.
Publisher: Inderscience Publishers
Date: 2017
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11816102_38
Publisher: Wiley
Date: 31-01-2023
DOI: 10.1111/MVE.12643
Abstract: Ticks (Acari: Ixodidae) are major disease vectors globally making it increasingly important to understand how altered vertebrate communities in urban areas shape tick population dynamics. In urban landscapes of Australia, little is known about which native and introduced small mammals maintain tick populations preventing host‐targeted tick management and leading to human–wildlife conflict. Here, we determined (1) larval, nymphal, and adult tick burdens on host species and potential drivers, (2) the number of ticks supported by the different host populations, and (3) the proportion of medically significant tick species feeding on the different host species in Northern Sydney. We counted 3551 ticks on 241 mammals at 15 sites and found that long‐nosed bandicoots ( Perameles nasuta ) hosted more ticks of all life stages than other small mammals but introduced black rats ( Rattus rattus ) were more abundant at most sites (33%–100%) and therefore important in supporting larval and nymphal ticks in our study areas. Black rats and bandicoots hosted a greater proportion of medically significant tick species including Ixodes holocyclus than other hosts. Our results show that an introduced human commensal contributes to maintaining urban tick populations and suggests ticks could be managed by controlling rat populations on urban fringes.
Publisher: Microbiology Society
Date: 16-12-2021
Abstract: Advances in sequencing technologies have revealed the complex and erse microbial communities present in ticks (Ixodida). As obligate blood-feeding arthropods, ticks are responsible for a number of infectious diseases that can affect humans, livestock, domestic animals and wildlife. While cases of human tick-borne diseases continue to increase in the northern hemisphere, there has been relatively little recognition of zoonotic tick-borne pathogens in Australia. Over the past 5 years, studies using high-throughput sequencing technologies have shown that Australian ticks harbour unique and erse bacterial communities. In the present study, free-ranging wildlife ( n =203), representing ten mammal species, were s led from urban and peri-urban areas in New South Wales (NSW), Queensland (QLD) and Western Australia (WA). Bacterial metabarcoding targeting the 16S rRNA locus was used to characterize the microbiomes of three s le types collected from wildlife: blood, ticks and tissue s les. Further sequence information was obtained for selected taxa of interest. Six tick species were identified from wildlife: Amblyomma triguttatum , Ixodes antechini , Ixodes australiensis , Ixodes holocyclus , Ixodes tasmani and Ixodes trichosuri . Bacterial 16S rRNA metabarcoding was performed on 536 s les and 65 controls, generating over 100 million sequences. Alpha ersity was significantly different between the three s le types, with tissue s les displaying the highest alpha ersity ( P .001). Proteobacteria was the most abundant taxon identified across all s le types (37.3 %). Beta ersity analysis and ordination revealed little overlap between the three s le types ( P .001). Taxa of interest included Anaplasmataceae , Bartonella , Borrelia , Coxiellaceae , Francisella , Midichloria , Mycoplasma and Rickettsia . Anaplasmataceae bacteria were detected in 17.7% (95/536) of s les and included Anaplasma , Ehrlichia and Neoehrlichia species. In s les from NSW, ‘ Ca . Neoehrlichia australis’, ‘ Ca . Neoehrlichia arcana’, Neoehrlichia sp. and Ehrlichia sp. were identified. A putative novel Ehrlichia sp. was identified from WA and Anaplasma platys was identified from QLD. Nine rodent tissue s les were positive for a novel Borrelia sp. that formed a phylogenetically distinct clade separate from the Lyme Borrelia and relapsing fever groups. This novel clade included recently identified rodent-associated Borrelia genotypes, which were described from Spain and North America. Bartonella was identified in 12.9% (69/536) of s les. Over half of these positive s les were obtained from black rats ( Rattus rattus ), and the dominant bacterial species identified were Bartonella coopersplainsensis and Bartonella queenslandensis . The results from the present study show the value of using unbiased high-throughput sequencing applied to s les collected from wildlife. In addition to understanding the sylvatic cycle of known vector-associated pathogens, surveillance work is important to ensure preparedness for potential zoonotic spillover events.
Publisher: IEEE
Date: 06-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2023
Publisher: IEEE
Date: 06-2007
Publisher: Springer Nature Singapore
Date: 2022
Publisher: SAGE Publications
Date: 08-2015
DOI: 10.1155/2015/764919
Abstract: We present two approaches that exploit biometric data to address security problems in the body sensor networks: a new key negotiation scheme based on the fuzzy extractor technology and an improved linear interpolation encryption method. The first approach designs two attack games to give the formal definition of fuzzy negotiation that forms a new key negotiation scheme based on fuzzy extractor technology. According to the definition, we further define a concrete structure of fuzzy negotiation that can enlarge the types of biometric data used to negotiate shared keys between biosensor nodes. The second approach includes a detailed key s ling method that uses shared secrets to generate linear interpolation factors and an improved linear interpolation encryption scheme based on linear equation group. Security analyses show that these two approaches are secure and can resist attacks launched by Ultra-Wide Band (UWB) technology, which has not received due attention in the existing studies.
Publisher: IEEE
Date: 29-11-2020
Publisher: IEEE
Date: 06-2015
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: CSIRO Publishing
Date: 2018
DOI: 10.1071/MA18063
Abstract: It may seem perplexing that there is any uncertainty in Australia about the existence of zoonotic tick-associated infections1–3. Outside this country, particularly in the northern hemisphere, tick-borne diseases such as human granulocytic anaplasmosis, babesiosis, Boutonneuse fever, ehrlichiosis, Lyme borreliosis, and tick-borne encephalitis, have well documented aetiologies, epidemiology, diagnostic methods, and treatments. Why is Australia different and what research is being conducted to address this issue? This article briefly addresses these questions and explains how high-throughput metagenomic analysis has started to shed light on bacterial microbiomes in Australian ticks, providing new data on the presence and distribution of potentially zoonotic microbial taxa.
Publisher: Elsevier BV
Date: 07-2017
Publisher: Springer International Publishing
Date: 24-11-2017
Publisher: IEEE
Date: 08-2014
Publisher: IEEE
Date: 08-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2014
DOI: 10.1109/TC.2013.13
Publisher: Elsevier BV
Date: 07-2021
Publisher: Wiley
Date: 30-04-2014
DOI: 10.1002/CPE.3042
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2023
Publisher: IEEE
Date: 06-2010
Publisher: IEEE
Date: 06-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2021
Publisher: Elsevier BV
Date: 10-2015
Publisher: Springer International Publishing
Date: 2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2011
Publisher: Springer International Publishing
Date: 2018
Publisher: Wiley
Date: 30-07-2016
DOI: 10.1002/CPE.3600
Publisher: Springer International Publishing
Date: 2018
Publisher: Oxford University Press (OUP)
Date: 29-07-2011
Publisher: Springer International Publishing
Date: 2018
Publisher: Oxford University Press (OUP)
Date: 18-07-2011
Publisher: The Royal Society
Date: 10-03-2010
Abstract: Owing to exceptional biomolecule preservation, fossil avian eggshell has been used extensively in geochronology and palaeodietary studies. Here, we show, to our knowledge, for the first time that fossil eggshell is a previously unrecognized source of ancient DNA (aDNA). We describe the successful isolation and lification of DNA from fossil eggshell up to 19 ka old. aDNA was successfully characterized from eggshell obtained from New Zealand (extinct moa and ducks), Madagascar (extinct elephant birds) and Australia (emu and owl). Our data demonstrate excellent preservation of the nucleic acids, evidenced by retrieval of both mitochondrial and nuclear DNA from many of the s les. Using confocal microscopy and quantitative PCR, this study critically evaluates approaches to maximize DNA recovery from powdered eggshell. Our quantitative PCR experiments also demonstrate that moa eggshell has approximately 125 times lower bacterial load than bone, making it a highly suitable substrate for high-throughput sequencing approaches. Importantly, the preservation of DNA in Pleistocene eggshell from Australia and Holocene deposits from Madagascar indicates that eggshell is an excellent substrate for the long-term preservation of DNA in warmer climates. The successful recovery of DNA from this substrate has implications in a number of scientific disciplines most notably archaeology and palaeontology, where genotypes and/or DNA-based species identifications can add significantly to our understanding of diets, environments, past bio ersity and evolutionary processes.
Publisher: IEEE
Date: 2009
DOI: 10.1109/NSS.2009.57
Publisher: Elsevier BV
Date: 2014
Publisher: IEEE
Date: 08-2014
Publisher: Springer International Publishing
Date: 2016
Publisher: IEEE
Date: 08-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Elsevier BV
Date: 12-2012
Publisher: IEEE
Date: 08-2014
Publisher: MDPI AG
Date: 17-07-2019
DOI: 10.3390/RS11141692
Abstract: Automatic weed detection and classification faces the challenges of large intraclass variation and high spectral similarity to other vegetation. With the availability of new high-resolution remote sensing data from various platforms and sensors, it is possible to capture both spectral and spatial characteristics of weed species at multiple scales. Effective multi-resolution feature learning is then desirable to extract distinctive intensity, texture and shape features of each category of weed to enhance the weed separability. We propose a feature extraction method using a Convolutional Neural Network (CNN) and superpixel based Local Binary Pattern (LBP). Both middle and high level spatial features are learned using the CNN. Local texture features from superpixel-based LBP are extracted, and are also used as input to Support Vector Machines (SVM) for weed classification. Experimental results on the hyperspectral and remote sensing datasets verify the effectiveness of the proposed method, and show that it outperforms several feature extraction approaches.
Publisher: IEEE
Date: 06-2009
Publisher: IEEE
Date: 03-2015
Publisher: IGI Global
Date: 2006
DOI: 10.4018/978-1-59140-947-2.CH014
Abstract: Lecturing large classes in tertiary education is always a challenge one of the most difficult tasks being how to gauge students’ understanding. Introducing interactivity can alleviate this problem by providing instant feedback that enables the lecturer to clarify problematical points. This is even more crucial and challenging when lecturing to large classes with students from many different cultural backgrounds. This chapter reports the authors’ experience with a wireless keypad-based system in different classrooms. New deployment strategies used in this project, and educational foundationson which they were based, are explained. The environment and the experience of using the technology from the educator’s viewpoint are also described. Student feedback is also discussed, and improvements for future use are also proposed.
Publisher: IEEE
Date: 12-2013
Publisher: IEEE
Date: 12-2013
Publisher: MDPI AG
Date: 12-10-2019
DOI: 10.3390/RS11202372
Abstract: Current new developments in remote sensing imagery enable satellites to capture videos from space. These satellite videos record the motion of vehicles over a vast territory, offering significant advantages in traffic monitoring systems over ground-based systems. However, detecting vehicles in satellite videos are challenged by the low spatial resolution and the low contrast in each video frame. The vehicles in these videos are small, and most of them are blurred into their background regions. While region proposals are often generated for efficient target detection, they have limited performance on satellite videos. To meet this challenge, we propose a Local Region Proposing approach (LRP) with three steps in this study. A video frame is segmented into semantic regions first and possible targets are then detected in these coarse scale regions. A discrete Histogram Mixture Model (HistMM) is proposed in the third step to narrow down the region proposals by quantifying their likelihoods towards the target category, where the training is conducted on positive s les only. Experiment results demonstrate that LRP generates region proposals with improved target recall rates. When a slim Fast-RCNN detector is applied, LRP achieves better detection performance over the state-of-the-art approaches tested.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2022
Publisher: Wiley
Date: 17-08-2022
DOI: 10.1002/CPE.5956
Abstract: The evolution of the traditional power system toward the modern smart grid has posed many new cybersecurity challenges to this critical infrastructure. One of the most dangerous cybersecurity threats is the false data injection (FDI) attack, especially when it is capable of completely bypassing the widely deployed bad data detector of state estimation (SE) and interrupting the normal operation of the power system. Most of the simulated FDI attacks are designed using a simplified linearized DC model, while most of the industry‐standard SE systems are based on the nonlinear AC model. In this article, a comprehensive FDI attack scheme is presented based on the nonlinear AC model. A case study of the nine‐bus Western System Coordinated Council (WSCC)'s power system is provided, using an industry‐standard package to assess the outcomes of the proposed design scheme. A public FDI dataset is generated as a test set for the community to develop and evaluate new detection algorithms, which are lacking in the field. The FDI's stealthy quality of the dataset is assessed and proven through a preliminary analysis based on both physical power law and statistical analysis.
Publisher: WORLD SCIENTIFIC
Date: 09-2011
Publisher: Hindawi Limited
Date: 2011
DOI: 10.1155/2011/310647
Abstract: Wireless personal area networks (WPANs) are getting popular in a variety of fields such as smart home, office automation, and e-healthcare. In WPANs, most devices are considerably energy constrained, so the communication protocol should be energy efficient. The IEEE 802.15.4 is designed as a standard protocol for low power, low data rate, low complexity, and short range connections in WPANs. The standard supports allocating several numbers of collision-free guarantee time slots (GTSs) within a superframe for some time-critical transmissions. Recently, COPE was proposed as a promising network coding architecture to essentially improve the throughput of wireless networks. In this paper, we exploit the network coding technique at coordinators to improve energy efficiency of the WPAN. Some related practical issues, such as GTS allocation and multicast, are also discussed in order to exploit the network coding opportunities efficiently. Since the coding opportunities are mostly exploited, our proposal achieves both higher energy efficiency and throughput performance than the original IEEE 802.15.4.
Publisher: Institution of Engineering and Technology
Date: 30-11-2017
DOI: 10.1049/PBSE004E_CH7
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2009
Publisher: IEEE
Date: 12-2013
Publisher: Springer International Publishing
Date: 2018
Publisher: Elsevier BV
Date: 2011
Publisher: Wiley
Date: 02-02-2011
DOI: 10.1002/SEC.240
Publisher: IEEE
Date: 12-2013
Publisher: IEEE
Date: 12-2013
Publisher: Springer Science and Business Media LLC
Date: 04-01-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-0004
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: IEEE
Date: 10-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2016
DOI: 10.1109/MCC.2016.107
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: IEEE
Date: 06-2013
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: IEEE
Date: 12-2013
Publisher: IEEE
Date: 2008
DOI: 10.1109/CSA.2008.5
Publisher: IEEE
Date: 12-2013
Publisher: Elsevier BV
Date: 12-2019
Publisher: Elsevier BV
Date: 12-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Elsevier BV
Date: 12-2018
DOI: 10.1016/J.MEEGID.2018.09.013
Abstract: Borrelia are tick-borne bacteria that in humans are the aetiological agents of Lyme disease and relapsing fever. Here we present the first genomes of B. turcica and B. tachyglossi, members of a recently described and rapidly expanding Borrelia clade associated with reptile (B. turcica) or echidna (B. tachyglossi) hosts, transmitted by hard ticks, and of unknown pathogenicity. Borrelia tachyglossi and B. turcica genomes are similar to those of relapsing fever Borrelia species, containing a linear ~ 900 kb chromosome, a single long (> 70 kb) linear plasmid, and numerous short (< 40 kb) linear and circular plasmids, as well as a suite of housekeeping and macronutrient biosynthesis genes which are not found in Lyme disease Borrelia. Additionally, both B. tachyglossi and B. turcica contain paralogous vsp and vlp proteins homologous to those used in the multiphasic antigen-switching system used by relapsing fever Borrelia to evade vertebrate immune responses, although their number was greatly reduced compared to human-infectious species. However, B. tachyglossi and B. turcica chromosomes also contain numerous genes orthologous to Lyme disease Borrelia-specific genes, demonstrating a unique evolutionary, and potentially phenotypic link between these groups. Borrelia tachyglossi and B. turcica genomes also have unique genetic features, including degraded and deleted tRNA modification genes, and an expanded range of macronutrient salvage and biosynthesis genes compared to relapsing fever and Lyme disease Borrelia. These genomes and genomic comparisons provide an insight into the biology and evolutionary origin of these Borrelia, and provide a valuable resource for future work.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Elsevier BV
Date: 2021
Publisher: Oxford University Press (OUP)
Date: 02-12-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2007
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2021
Publisher: Hindawi Limited
Date: 12-06-2018
DOI: 10.1155/2018/7107295
Abstract: Smart mobile devices are playing a more and more important role in our daily life. Cancelable biometrics is a promising mechanism to provide authentication to mobile devices and protect biometric templates by applying a noninvertible transformation to raw biometric data. However, the negative effect of nonlinear distortion will usually degrade the matching performance significantly, which is a nontrivial factor when designing a cancelable template. Moreover, the attacks via record multiplicity (ARM) present a threat to the existing cancelable biometrics, which is still a challenging open issue. To address these problems, in this paper, we propose a new cancelable fingerprint template which can not only mitigate the negative effect of nonlinear distortion by combining multiple feature sets, but also defeat the ARM attack through a proposed feature decorrelation algorithm. Our work is a new contribution to the design of cancelable biometrics with a concrete method against the ARM attack. Experimental results on public databases and security analysis show the validity of the proposed cancelable template.
Publisher: IEEE
Date: 2004
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2013
Publisher: Association for Computing Machinery (ACM)
Date: 13-07-2021
DOI: 10.1145/3460427
Abstract: The past four years have witnessed the rapid development of federated learning (FL). However, new privacy concerns have also emerged during the aggregation of the distributed intermediate results. The emerging privacy-preserving FL (PPFL) has been heralded as a solution to generic privacy-preserving machine learning. However, the challenge of protecting data privacy while maintaining the data utility through machine learning still remains. In this article, we present a comprehensive and systematic survey on the PPFL based on our proposed 5W-scenario-based taxonomy. We analyze the privacy leakage risks in the FL from five aspects, summarize existing methods, and identify future research directions.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2020
Publisher: Springer Science and Business Media LLC
Date: 03-09-2011
Publisher: Elsevier BV
Date: 03-2020
Publisher: IEEE
Date: 06-2011
Publisher: IEEE
Date: 12-2013
DOI: 10.1109/CIS.2013.162
Publisher: Cold Spring Harbor Laboratory
Date: 17-10-2019
DOI: 10.1101/807131
Abstract: Ticks (Acari: Ixodida) transmit a greater variety of pathogens than any other blood-feeding group of arthropods. While numerous microbes have been identified inhabiting Australian Ixodidae, some of which are related to globally important tick-borne pathogens, little is known about the bacterial communities within ticks collected from Australian wildlife. In this study, 1,019 ticks were identified on 221 hosts spanning 27 wildlife species. Next-generation sequencing was used to lify the V1-2 hypervariable region of the bacterial 16S rRNA gene from 238 ticks Amblyomma triguttatum (n=6), Bothriocroton auruginans (n=11), Bothriocroton concolor (n=20), Haemaphysalis bancrofti (n=10), Haemaphysalis bremneri (n=4), Haemaphysalis humerosa (n=13) , Haemaphysalis longicornis (n=4), Ixodes antechini (n=29), Ixodes australiensis (n=26), Ixodes fecialis (n=13), Ixodes holocyclus (n=37), Ixodes myrmecobii ( n =1), Ixodes ornithorhynchi (n=10), Ixodes tasmani (n=51) and Ixodes trichosuri (n=3). After bioinformatic analyses, over 14 million assigned bacterial sequences revealed the presence of recently described bacteria ‘ Candidatus Borrelia tachyglossi’, ‘ Candidatus Neoehrlichia australis’, ‘ Candidatus Neoehrlichia arcana’ and ‘ Candidatus Ehrlichia ornithorhynchi’. Furthermore, three novel Anaplasmataceae species were identified in the present study including a Neoehrlichia sp. in I. australiensis and I. fecialis collected from quenda ( Isoodon fusciventer ) (Western Australia), an Anaplasma sp. from one B. concolor from echidna ( Tachyglossus aculeatus ) (New South Wales), and an Ehrlichia sp. from a single I. fecialis parasitising a quenda (WA). This study highlights the ersity of bacterial genera harboured within wildlife ticks, which may prove to be of medical and/or veterinary importance in the future.
Publisher: IEEE
Date: 07-2017
Publisher: Elsevier BV
Date: 11-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2014
Publisher: IEEE
Date: 06-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2016
Publisher: IEEE
Date: 06-2011
Publisher: IEEE
Date: 06-2011
Publisher: Elsevier BV
Date: 05-2018
DOI: 10.1016/J.WATRES.2018.02.005
Abstract: As part of long-term monitoring of Cryptosporidium in water catchments serving Western Australia, New South Wales (Sydney) and Queensland, Australia, we characterised Cryptosporidium in a total of 5774 faecal s les from 17 known host species and 7 unknown bird s les, in 11 water catchment areas over a period of 30 months (July 2013 to December 2015). All s les were initially screened for Cryptosporidium spp. at the 18S rRNA locus using a quantitative PCR (qPCR). Positives s les were then typed by sequence analysis of an 825 bp fragment of the 18S gene and subtyped at the glycoprotein 60 (gp60) locus (832 bp). The overall prevalence of Cryptosporidium across the various hosts s led was 18.3% (1054/5774 95% CI, 17.3-19.3). Of these, 873 s les produced clean Sanger sequencing chromatograms, and the remaining 181 s les, which initially produced chromatograms suggesting the presence of multiple different sequences, were re-analysed by Next- Generation Sequencing (NGS) to resolve the presence of Cryptosporidium and the species composition of potential mixed infections. The overall prevalence of confirmed mixed infection was 1.7% (98/5774), and in the remaining 83 s les, NGS only detected one species of Cryptosporidium. Of the 17 Cryptosporidium species and four genotypes detected (Sanger sequencing combined with NGS), 13 are capable of infecting humans C. parvum, C. hominis, C. ubiquitum, C. cuniculus, C. meleagridis, C. canis, C. felis, C. muris, C. suis, C. scrofarum, C. bovis, C. erinacei and C. fayeri. Oocyst numbers per gram of faeces (g
Publisher: IEEE
Date: 12-2016
Publisher: Elsevier BV
Date: 02-2018
Publisher: Oxford University Press (OUP)
Date: 05-09-2013
Publisher: Elsevier BV
Date: 06-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2007
Publisher: Public Library of Science (PLoS)
Date: 28-12-2015
Publisher: IEEE
Date: 12-2016
Publisher: IEEE
Date: 06-2007
DOI: 10.1109/ICC.2007.200
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2021
Publisher: IEEE
Date: 06-2007
DOI: 10.1109/ICC.2007.202
Publisher: Elsevier BV
Date: 07-2009
Publisher: Association for Computing Machinery (ACM)
Date: 02-08-2016
DOI: 10.1145/2930669
Abstract: As a promising bio-cryptographic technique, the fuzzy extractor seamlessly binds biometrics and cryptography for template protection and key generation. However, most existing methods hardly solve the following issues simultaneously: (1) Fingerprint registration, (2) Verification accuracy, (3) Security strength, and (4) Computational efficiency. In this article, we introduce a bio-crypto-oriented fingerprint verification scheme - Selective Vertex-indexed Triangulation (SViT) which maps minutia global topology to local triangulation with minimum information loss. Then, a SViT-based fuzzy extractor framework (FE-SViT) is proposed and high verification accuracy is achieved. The FE-SViT is highly parallelizable and efficient which makes it suitable for embedded devices.
Publisher: MDPI AG
Date: 05-07-2016
DOI: 10.3390/FI8030029
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2022
Publisher: IEEE
Date: 07-2012
Publisher: Wiley
Date: 27-06-2016
DOI: 10.1002/SEC.1497
Publisher: Springer Science and Business Media LLC
Date: 20-04-2023
DOI: 10.1007/S13384-022-00526-3
Abstract: Teacher self-efficacy (TSE) of pre-service and in-service teachers plays a significant role in the successful implementation of educational reforms. The purpose of this systematic literature review is to explore the interaction between curriculum and/or assessment reform and TSE. Twenty-nine empirical research studies are analysed to find factors that impact TSE during change and the support mechanisms necessary to maintain high TSE. Using the Systematic Quantitative Literature Review method coupled with Social Cognitive Theory and Sources of Self-efficacy, studies reported that environmental determinants lower TSE during reform. It was found that to support high TSE professional learning was a necessity.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2021
Publisher: Public Library of Science (PLoS)
Date: 26-12-2018
Publisher: Institution of Engineering and Technology
Date: 12-04-2018
Publisher: Springer Science and Business Media LLC
Date: 05-05-2017
Publisher: Springer Science and Business Media LLC
Date: 25-06-2015
Publisher: IEEE
Date: 07-2010
DOI: 10.1109/NCA.2010.37
Publisher: Elsevier BV
Date: 06-2020
Publisher: Springer International Publishing
Date: 2013
Publisher: Oxford University Press (OUP)
Date: 20-03-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-07-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 05-2010
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2014
DOI: 10.1109/MCC.2014.53
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Elsevier BV
Date: 07-2011
Publisher: Hindawi Limited
Date: 2017
DOI: 10.1155/2017/3606424
Abstract: Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP) for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.
Publisher: IEEE
Date: 04-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2015
Publisher: IEEE
Date: 09-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Springer Science and Business Media LLC
Date: 20-03-2019
Publisher: Elsevier BV
Date: 06-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2015
Publisher: Elsevier BV
Date: 2016
Publisher: AIP
Date: 2012
DOI: 10.1063/1.4756447
Publisher: Elsevier BV
Date: 08-2021
DOI: 10.1016/J.MEEGID.2021.104859
Abstract: Cryptosporidium is an important protozoan parasite and due to its resistance to chlorine is a major cause of swimming pool-associated gastroenteritis outbreaks. The present study combined contact tracing and molecular techniques to analyse cryptosporidiosis cases and outbreaks in Western Australia in 2019 and 2020. In the 2019 outbreak, subtyping at the 60 kDa glycoprotein (gp60) gene identified 89.0% (16/18) of s les were caused by the C. hominis IdA15G1 subtype. Amplicon next generation sequencing (NGS) at the gp60 locus identified five C. hominis IdA15G1 subtype s les that also had C. hominis IdA14 subtype DNA, while multi locus sequence typing (MLST) analysis on a subset (n = 14) of C. hominis s les identified three IdA15G1 s les with a 6 bp insertion at the end of the trinucleotide repeat region of the cp47 gene. In 2020, 88.0% (73/83) of s les typed were caused by the relatively rare C. hominis subtype IbA12G3. Four mixed infections were observed by NGS with three IdA15G1/ IdA14 mixtures and one C. parvum IIaA18G3R1 s le mixed with IIaA16G3R1. No genetic ersity using MLST was detected. Epidemiological and molecular data indicates that the outbreaks in 2019 and 2020 were each potentially from swimming pool point sources and a new C. hominis subtype IbA12G3 is emerging in Australia. The findings of the present study are important for understanding the introduction and transmission of rare Cryptosporidium subtypes to vulnerable populations.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Elsevier BV
Date: 2011
Publisher: IEEE
Date: 2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2015
DOI: 10.1109/MCC.2015.34
Publisher: IEEE
Date: 12-2018
Publisher: Elsevier BV
Date: 09-2019
DOI: 10.1016/J.MEEGID.2019.05.018
Abstract: Cryptosporidium species are a major cause of diarrhoea worldwide. In the present study, a retrospective analysis of 109 microscopically Cryptosporidium-positive faecal specimens from Western Australian patients, collected between 2015 and 2018 was conducted. Sequence analysis of the 18S rRNA and the 60 kDa glycoprotein (gp60) gene loci identified four Cryptosporidium species: C. hominis (86.2%, 94/109), C. parvum (11.0%, 12/109), C. meleagridis (1.8%, 2/109) and C. viatorum (0.9%, 1/109). Subtyping at the gp60 locus identified a total of 11 subtypes including the emergence of the previously rare C. hominis IfA12G1R5 subtype in 2017 as the dominant subtype (46.7%, 21/45). This subtype has also recently emerged as the dominant subtype in the United States but the reasons for its emergence are unknown. This is also the first report of C. viatorum in humans in Australia and a novel subtype (XVaA3g) was identified in the one positive patient.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2015
Publisher: Springer Science and Business Media LLC
Date: 29-12-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-0012
Publisher: Elsevier BV
Date: 12-2021
Publisher: Wiley
Date: 29-02-2012
DOI: 10.1002/CPE.2810
Publisher: Magnolia Press
Date: 14-08-2019
DOI: 10.11646/ZOOTAXA.4656.2.13
Abstract: Ticks (Ixodida) are haematophagous arthropods that transmit a number of pathogenic organisms, including bacteria, protozoa and viruses, to humans and animals. Globally, there are over 900 species of ticks and Australia has 73 described species, including five introduced and 68 native species. With the exception of only a few Australian tick species, there are still many unanswered questions regarding their taxonomy and systematics, and the phylogeny of Australian ticks is not properly resolved. In recent years, a putative link between tick bites and poorly defined tick-borne illness(es) has been identified (Graves & Stenos 2017) and was the subject of a 2015 Australian Senate Inquiry into Lyme-like illnesses in Australia. There is an urgent need to further categorise Australian ticks, specifically hard ticks (Ixodidae), and accurate identification of Australian ticks is therefore of high importance.
Publisher: Wiley
Date: 08-05-2018
DOI: 10.1111/COIN.12177
Publisher: Elsevier BV
Date: 03-2017
DOI: 10.1016/J.VETMIC.2017.01.021
Abstract: Q fever is an infectious disease with a global distribution caused by the intracellular bacterium, Coxiella burnetii, which has been detected in a large number of tick species worldwide, including the brown dog tick, Rhipicephalus sanguineus. Recent reports of a high seroprevalance of C. burnetii in Australian dogs, along with the identification of additional Coxiella species within R. sanguineus ticks, has prompted an investigation into the presence and identification of Coxiella species in R. sanguineus ticks in Australia. Using a combination of C. burnetii species-specific IS1111a transposase gene and Coxiella genus-specific 16S rRNA PCR assays, a Coxiella sp. was identified in 100% (n=199) of R. sanguineus ticks analysed, and C. burnetii was not detected in any R. sanguineus ticks studied. Phylogenetic analysis of the 16S rRNA gene revealed the Coxiella sequences were closely related to Coxiella sp. identified previously in R. sanguineus and R. turanicus ticks overseas. This study illustrates the value of using genus specific PCR assays to detect previously unreported bacterial species. Furthermore, the presence of an additional Coxiella sp. in Australia requires further investigation into its potential for contributing to serological cross-reactions during Q fever testing.
Publisher: Elsevier BV
Date: 09-2016
Publisher: Elsevier BV
Date: 03-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2014
Publisher: Elsevier BV
Date: 08-2018
Publisher: SAGE Publications
Date: 15-08-2020
Abstract: Multi-objective Markov decision processes are a special kind of multi-objective optimization problem that involves sequential decision making while satisfying the Markov property of stochastic processes. Multi-objective reinforcement learning methods address this kind of problem by fusing the reinforcement learning paradigm with multi-objective optimization techniques. One major drawback of these methods is the lack of adaptability to non-stationary dynamics in the environment. This is because they adopt optimization procedures that assume stationarity in order to evolve a coverage set of policies that can solve the problem. This article introduces a developmental optimization approach that can evolve the policy coverage set while exploring the preference space over the defined objectives in an online manner. We propose a novel multi-objective reinforcement learning algorithm that can robustly evolve a convex coverage set of policies in an online manner in non-stationary environments. We compare the proposed algorithm with two state-of-the-art multi-objective reinforcement learning algorithms in stationary and non-stationary environments. Results showed that the proposed algorithm significantly outperforms the existing algorithms in non-stationary environments while achieving comparable results in stationary environments.
Publisher: MDPI AG
Date: 23-10-2020
Abstract: The impact of emerging infectious diseases is increasingly recognised as a major threat to wildlife. Wild populations of the endangered Tasmanian devil, Sarcophilus harrisii, are experiencing devastating losses from a novel transmissible cancer, devil facial tumour disease (DFTD) however, despite the rapid decline of this species, there is currently no information on the presence of haemoprotozoan parasites. In the present study, 95 Tasmanian devil blood s les were collected from four populations in Tasmania, Australia, which underwent molecular screening to detect four major groups of haemoprotozoa: (i) trypanosomes, (ii) piroplasms, (iii) Hepatozoon, and (iv) haemosporidia. Sequence results revealed Trypanosoma infections in 32/95 in iduals. Trypanosoma copemani was identified in 10 Tasmanian devils from three sites and a second Trypanosoma sp. was identified in 22 in iduals that were grouped within the poorly described T. cyclops clade. A single blood s le was positive for Babesia sp., which most closely matched Babesia lohae. No other blood protozoan parasite DNA was detected. This study provides the first insight into haemoprotozoa from the Tasmanian devil and the first identification of Trypanosoma and Babesia in this carnivorous marsupial.
Publisher: Elsevier BV
Date: 03-2014
Publisher: IEEE
Date: 12-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2022
Publisher: Cold Spring Harbor Laboratory
Date: 05-11-2019
DOI: 10.1101/819060
Abstract: Invasive rodent species are known hosts for a erse range of infectious microorganisms and have long been associated with the spread of disease globally. The present study describes molecular evidence for the presence of a Trypanosoma sp. from black rats ( Rattus rattus ) in northern Sydney, Australia. Sequences of the 18S ribosomal RNA (rRNA) locus were obtained in two out of eleven (18%) blood s les with subsequent phylogenetic analysis confirming the identity within the Trypanosoma lewisi clade.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: Springer International Publishing
Date: 2014
Publisher: Elsevier BV
Date: 08-2020
Publisher: World Scientific Pub Co Pte Lt
Date: 09-2017
DOI: 10.1142/S0129054117400196
Abstract: Cloud computing enables users to outsource complicated computational tasks to a commercial computing server and relieves the users from establishing and maintaining expensive local computation systems. In this scenario, the minimum security requirement is that the result returned by the server must be correct. Publicly verifiable computation (PVC) has been proposed to address this issue by allowing the computational result to be publicly verifiable. Observing that computational tasks are usually private business in practice, we propose a confidentiality-preserving security tool referred to as confidentiality-preserving publicly verifiable computation (CP-PVC), to efficiently address the scenario where a client would like to outsource a computational task to a cloud server but does not possess the input value locally. The CP-PVC allows the client to delegate the outsourcing computational task to anyone authorized and keeps the computational result confidential to anyone except the client, while not sacrificing the property of public verifiability. We propose a CP-PVC construction based on any one-key secure attribute-based encryption (ABE). Our construction is general as known ABE schemes are all one-key secure. Analysis shows that our CP-PVC scheme achieves computational result privacy without any significant extra cost and is almost as efficient as the up-to-date PVC schemes. These features render our CP-PVC as a practical and widely applicable tool to secure cloud computing.
Publisher: IEEE
Date: 12-2010
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2022
Publisher: IEEE
Date: 11-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Wiley
Date: 28-08-2011
DOI: 10.1002/SEC.221
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2015
Publisher: IEEE
Date: 11-2016
Publisher: Elsevier BV
Date: 11-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2012
Publisher: Institution of Engineering and Technology (IET)
Date: 08-2015
DOI: 10.1049/EL.2015.1349
Publisher: Wiley
Date: 03-08-2011
DOI: 10.1002/SEC.226
Publisher: IEEE
Date: 03-2015
Publisher: Wiley
Date: 03-12-2011
DOI: 10.1002/SEC.225
Publisher: IEEE
Date: 2003
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: MDPI AG
Date: 26-10-2022
DOI: 10.3390/S22218188
Abstract: The basic properties of blockchain, such as decentralization, security, and immutability, show promising potential for IoT applications. The main feature—decentralization of blockchain technology—depends on the consensus. However, consensus algorithms are mostly designed to work in extensive computational and communication environments for network security and immutability, which is not desirable for resource-restricted IoT applications. Many solutions are proposed to address this issue with modified consensus algorithms based on the legacy consensus, such as the PoW, PoS, and BFT, and new non-linear data structures, such as DAG. A systematic classification and analysis of various techniques in the field will be beneficial for both researchers and industrial practitioners. Most existing relevant surveys provide classifications intuitively based on the domain knowledge, which are infeasible to reveal the intrinsic and complicated relationships among the relevant basic concepts and techniques. In this paper, a powerful tool of systematic knowledge classification and explanation is introduced to structure the survey on blockchain consensus algorithms for resource-constrained IoT systems. More specifically, an ontology was developed for a consensus algorithm apropos of IoT adaptability. The developed ontology is sub ided into two parts—CONB and CONIoT—representing the classification of generic consensus algorithms and the ones that are particularly proposed for IoT, respectively. Guided by this ontology, an in depth discussion and analysis are provided on the major consensus algorithms and their IoT compliance based on design and implementation targets. Open research challenges and future research directions are provided.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Elsevier BV
Date: 12-2018
Publisher: IEEE
Date: 12-2010
Publisher: Elsevier BV
Date: 06-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Hindawi Limited
Date: 21-06-2018
DOI: 10.1155/2018/5275132
Abstract: With the development of cloud services, outsourcing computation tasks to a commercial cloud server has drawn attention of various communities, especially in the Big Data era. Public verifiability offers a flexible functionality in real circumstance where the cloud service provider (CSP) may be untrusted or some malicious users may slander the CSP on purpose. However, sometimes the computational result is sensitive and is supposed to remain undisclosed in the public verification phase, while existing works on publicly verifiable computation (PVC) fail to achieve this requirement. In this paper, we highlight the property of result confidentiality in publicly verifiable computation and present confidentiality-preserving public verifiable computation (CP-PVC) schemes for multivariate polynomial evaluation and matrix-vector multiplication, respectively. The proposed schemes work efficiently under the amortized model and, compared with previous PVC schemes for these computations, achieve confidentiality of computational results, while maintaining the property of public verifiability. The proposed schemes proved to be secure, efficient, and result-confidential. In addition, we provide the algorithms and experimental simulation to show the performance of the proposed schemes, which indicates that our proposal is also acceptable in practice.
Publisher: Elsevier BV
Date: 09-0008
Publisher: Elsevier BV
Date: 09-2020
Publisher: Elsevier BV
Date: 05-2012
Publisher: Institution of Engineering and Technology (IET)
Date: 07-2014
DOI: 10.1049/EL.2014.1927
Publisher: IEEE
Date: 2005
Publisher: IEEE
Date: 11-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Springer Science and Business Media LLC
Date: 10-05-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2017
Publisher: Springer International Publishing
Date: 2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2019
Publisher: Edith Cowan University
Date: 03-2022
DOI: 10.14221/AJTE.2022V47N3.3
Abstract: Demands that Initial Teacher Education (ITE) prepare teachers who can equip students to be agile real-world problem solvers are frequent. Guidance about ITE integrated curriculum approaches to achieve this aim is harder to find, a significant gap given increasing time and policy pressures for ITE educators. Drawing from an Australian context, this systematic review investigates how integrated curriculum is conceptualised and enacted in secondary schooling ITE courses. Three conceptions of integrated curriculum for ITE are highlighted – Interdisciplinary, Disciplinary Literacy, and Transdisciplinary approaches – alongside benefits and barriers to enacting integrated curriculum. Recommendations for further research and practice around integrated curriculum are proposed.
Start Date: 09-2004
End Date: 09-2007
Amount: $330,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2009
End Date: 06-2012
Amount: $247,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 11-2019
End Date: 10-2024
Amount: $450,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 02-2010
End Date: 12-2013
Amount: $250,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 05-2011
End Date: 12-2015
Amount: $270,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 09-2012
End Date: 09-2016
Amount: $145,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 05-2019
End Date: 05-2023
Amount: $385,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 12-2010
End Date: 12-2015
Amount: $365,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 09-2004
End Date: 12-2007
Amount: $240,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 01-2021
End Date: 01-2024
Amount: $390,000.00
Funder: Australian Research Council
View Funded Activity