{"title":"Solving the Bounded-Depth Steiner Tree Problem using an Adiabatic Quantum Computer","authors":"Kai Liu, M. Dinneen","doi":"10.1109/CSDE48274.2019.9162395","DOIUrl":"https://doi.org/10.1109/CSDE48274.2019.9162395","url":null,"abstract":"We propose a quadratic unconstrained binary optimization (QUBO) formulation for the Bounded-Depth Steiner Tree problem suitable for adiabatic quantum computers. The numbers of qubits (dimension of QUBO matrices) required by our formulation is $mathrm{O}(vert V vert^{3})$, where $vert V vert$ represents the number of vertices. A D-Wave 2X computer consisting of 1098 active qubits is evaluated for a selection of known common graphs. Experimental results are shown and discussed. Our results are applicable to the Bounded-Depth Minimum Spanning Tree problem, as a special case.","PeriodicalId":238744,"journal":{"name":"2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum Consensus","authors":"Jorden Seet, Paul Griffin","doi":"10.1109/CSDE48274.2019.9162386","DOIUrl":"https://doi.org/10.1109/CSDE48274.2019.9162386","url":null,"abstract":"In this paper, we propose a novel consensus mechanism utilizing the quantum properties of qubits. This move from classical computing to quantum computing is shown to theoretically enhance the scalability and speed of distributed consensus as well as improve security and be a potential solution for the problem of blockchain interoperability. Using this method may circumvent the common problem known as the Blockchain Trilemma, enhancing scalability and speed without sacrificing de-centralization or byzantine fault tolerance [1]. Consensus speed and scalability is shown by removing the need for multicast responses and exploiting quantum properties to ensure that only a single multicast is required. We also leverage work done on the E91 quantum key distribution protocol [2] to securely transmit values and prevent a man-in-the-middle attack or system disturbance, enhancing confidentiality and integrity of transmitted information. Distributed ledger interoperability is explored by proposing a system to achieve a verifiable bridge for private transactions between a small private network and its corresponding consortium network. A proof-of-concept using IBM’s Qskit is shown from which initial results appear to show a strong sensitivity to non-consensus which could be useful in many applications. The present practical feasibility of the above is shown and future work is explored.","PeriodicalId":238744,"journal":{"name":"2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132487633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and privacy management in cross-domain tracking systems within an e-marketing context","authors":"B. Amarasekara, A. Mathrani, C. Scogings","doi":"10.1109/CSDE48274.2019.9162393","DOIUrl":"https://doi.org/10.1109/CSDE48274.2019.9162393","url":null,"abstract":"Online tracking is fast becoming synonymous with stalking and is associated with privacy concerns. Countries are in a hurry to introduce new privacy legislature while compliance is becoming increasingly difficult to adhere to. This is paving the way for many country- and region-specific rules to creep in instead of building more universally accepted rules and norms. With the ongoing development of connected technologies, more services are becoming available to business enterprises that have cross-domain tracking capabilities as the underlying technology. Importantly, the privacy responsibility is passed on to the business practitioners by tracking services, as those services are invisible to the users of those services. This research uses a simulated network environment to test, verify and describe information security and privacy vulnerabilities associated with some of the common technologies in use today. We describe how privacy can be compromised as individuals and businesses prefer convenience over data protection. This study will enable practitioners to assess risks, evaluate responsibilities and make informed decisions regarding usage of those technologies.","PeriodicalId":238744,"journal":{"name":"2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133255232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanghyun Park, Hyoung-Tak Kim, Kwang-hyun Kim, Jong-Rae Cho
{"title":"Structural integrity assessment of reactor cavities and containment following steam explosion.","authors":"Sanghyun Park, Hyoung-Tak Kim, Kwang-hyun Kim, Jong-Rae Cho","doi":"10.1109/CSDE48274.2019.9162372","DOIUrl":"https://doi.org/10.1109/CSDE48274.2019.9162372","url":null,"abstract":"Nuclear power is a major source of electricity production in the international community, but recently, due to serious nuclear accidents, a large amount of radiation leakage has caused a lot of damage. Since then, research on nuclear safety has been conducted around the world. Generally, nuclear severe accidents have been continuously increased in temperature due to the disruption of cooling water supply in nuclear reactor. According to the cooling water disruption, the core melt is generated. And the core melt is arranged to reactor in the lower head. If continuous heat accumulates, it is exposed melt through the lower head to the reactor, and a steam explosion occurs by Fuel Coolant Interaction (FCI). In this study, the structural integrity of reactor cavities and containment buildings was evaluated by the steam explosion through FCI. Steam pressure was obtained through the TEXAX V code, and the reactor cavity and containment building consisted of a reinforced concrete structure and liner plate based on the APR-1400.","PeriodicalId":238744,"journal":{"name":"2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116379446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kazuhiko Takahashi, Risa Watanabe, Hidemi Yamasaki, M. Hashimoto
{"title":"Remarks on a Quaternion Recurrent Neural Network for Controlling a Robot Manipulator","authors":"Kazuhiko Takahashi, Risa Watanabe, Hidemi Yamasaki, M. Hashimoto","doi":"10.1109/CSDE48274.2019.9162383","DOIUrl":"https://doi.org/10.1109/CSDE48274.2019.9162383","url":null,"abstract":"In this study, the application of a quaternion recur-rent neural network (QRNN) for controlling a robot manipulator is investigated. A QRNN that considers two types of recurrent networks: Elman network and Jordan network, with a split-type quaternion activation function of neurons is used. Also, a realtime recurrent learning extended to quaternion numbers is introduced to train the network using a back-propagation algorithm. In the computational experiments, a three-link robot manipulator controlled using the proposed QRNN-based controller is used. The simulation results demonstrate the effectiveness of the proposed QRNN for practical control applications.","PeriodicalId":238744,"journal":{"name":"2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125621430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Sharma, Avinesh Prasad, S. Narayan, B. Kumar, Vineet Singh, Salsabil Nusair, G. Khan
{"title":"Partnerships with Governments to Implement In-Country Science Programmes in the South Pacific Region","authors":"B. Sharma, Avinesh Prasad, S. Narayan, B. Kumar, Vineet Singh, Salsabil Nusair, G. Khan","doi":"10.1109/CSDE48274.2019.9162419","DOIUrl":"https://doi.org/10.1109/CSDE48274.2019.9162419","url":null,"abstract":"This paper essays the design of a new cohort-based model to deliver science programmes for high school graduates and teachers teaching science in the high schools in the South Pacific. The aim is to increase the number of skilled science teachers and ultimately the number of science graduates qualified to work in not only the public-private sectors but also find solutions to unique problems faced in the South Pacific. Sustaining such programmes depends heavily on the culminated tripartite efforts between students, respective regional countries and higher education institutes. The University of the South Pacific offers selected undergraduate degree programmes through its Science Teachers Accelerated Programme (STAP) and the In-country Science Programme (ISP) in its member countries. The government bodies decide upon the discipline combinations of programme based on their countries’ priority areas. The first STAP launched in Samoa in 2014 had 60 science teachers enrolled in Bachelor of Science with 5 different combination of majors. The partnership achieved well and in turn paved the way for STAP offers in Samoa (second cohort), Tonga and Vanuatu. Ideally, science students would travel to the main USP Campus in Fiji for further studies; however, with programmes like STAP and ISP, the university is able to deliver science to its various member countries at much lower costs. This paper will highlight the design and implementation of the new cohort based science model, together with the successes and opportunities for the future.","PeriodicalId":238744,"journal":{"name":"2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128069647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Ai, Y. Zuo, Junxia Liu, Peichao He, Tie-shan Li, C. L. Philip Chen
{"title":"Application of hierarchical clustering analysis for vocal feature extraction","authors":"J. Ai, Y. Zuo, Junxia Liu, Peichao He, Tie-shan Li, C. L. Philip Chen","doi":"10.1109/CSDE48274.2019.9162362","DOIUrl":"https://doi.org/10.1109/CSDE48274.2019.9162362","url":null,"abstract":"Since Mel-Frequency Cepstral Coefficient (MFCC) was firstly proposed in 1980s, it became the mostly-used speech feature in the field of automatic speech. MFCC employed Mel filters to transform the vocal frequency into Mel frequency, and considered a logarithmic relationship between practical frequency and Mel frequency. However, most of MFCCs used 26 blocks of uniform Fbanks without consideration of the dynamic characteristics of cepstrum coefficients. To address this issue, this paper proposes a hierarchical clustering approach to analyze the inverse discrete cosine transform cepstrum coefficient (IDCT CC), and uses cosine similarity to measure the distribution of blocks of the IDCT CC in the frequency domain. Our method extracts a 14-dimension vocal feature vector, and calls this feature as C-vector. In the experiment, we investigated the performance of C-vector for the speaker identification (SI) tasks, and employ Gaussian mixture model (GMM) to train SI models based on the C-vector. The results showed that the identification accuracy of C-vector was better than MFCC.","PeriodicalId":238744,"journal":{"name":"2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121900861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Anisur Rahman Tonu, Sharfuzzaman Hridoy, M. Ali, S. Azad
{"title":"Block - NID: A Conceptual Secure Blockchain Based National Identity Management System Model","authors":"Md. Anisur Rahman Tonu, Sharfuzzaman Hridoy, M. Ali, S. Azad","doi":"10.1109/csde48274.2019.9162366","DOIUrl":"https://doi.org/10.1109/csde48274.2019.9162366","url":null,"abstract":"Blockchain technology is becoming more and more popular day-by-day with an escalating interest in numerous applications ranging from data management, financial services, cyber security, Internet of things (IoT) and food science to healthcare industry and brain research. There has been a remarkable interest witnessed in utilizing applications of blockchain for the delivery of safe and secure National Identity (ID) management. Also, blockchain can reform the traditional ID management practices to a more reliable means in terms of effective use and distribution through safe and secure data sharing. In the future blockchain could be a technology that may potentially help in personalized, authentic, and secure ID management by merging the entire real-time user data of a citizen and presenting it in an up-to-date secure setup. In this paper we review both the existing and latest developments in the field of ID card system by implementing blockchain as a model. We also discuss the applications of blockchain along with the challenges faced and future perspectives.","PeriodicalId":238744,"journal":{"name":"2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"334-335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130916707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Takt Time in Pull Systems for Small and Medium-sized Enterprises","authors":"E. McArdle, Sanjay Mathrani","doi":"10.1109/CSDE48274.2019.9162371","DOIUrl":"https://doi.org/10.1109/CSDE48274.2019.9162371","url":null,"abstract":"Large scale industrial manufacturers have for several years, as part of Lean manufacturing initiatives, used the metric of takt time to ensure that goods flow through their manufacturing systems at optimum efficiency to achieve customer demand. However, there has been no specific research into how small and medium-sized enterprises (SMEs) use takt time within their systems to meet customer demand. The aim of this research is to analyse how takt time can be used to help SMEs meet customer demand efficiently. This research compares literature findings with common practices identified through two case studies, the first with a consultant who has expertise in this area and the second with a New Zealand SME. The findings of this research identify a method of takt time use for SMEs and develop a framework to optimise the throughput of pull manufacturing systems.","PeriodicalId":238744,"journal":{"name":"2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114791986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Usage and Spending on Mobile Games: A Comparison Between Australian Single-Player Gamers and Multi-Player Gamers","authors":"Maen Zubaydi, E. Gide","doi":"10.1109/CSDE48274.2019.9162377","DOIUrl":"https://doi.org/10.1109/CSDE48274.2019.9162377","url":null,"abstract":"Mobile games are games that can be played on smartphones or tablets. When the industry first started, iconic games like Tetris and Snake were developed by the mobile phone manufacturers. But today, there are millions of games on offer, created by third-party developers. This has created a whole industry thanks to the emergence of smartphone technology. Mobile games fall under many categories, yet all of them can be classified into two types: single-player mode games and multi-player mode games. This study aims to research the differences between Australian single-player games and multiplayer games in terms of their consumer usage and spending behavior. The study surveyed Australian Android mobile users and conducted paired sample t-test analysis on the collected data. The study has found that despite measuring no statistical difference between players’ overall spending behavior, multiplayer gamers spend significantly more time and money playing mobile games than single-player gamers. This suggests that multi-player game players are a more profitable segment of the gaming market than single-player game players.","PeriodicalId":238744,"journal":{"name":"2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134193017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}