Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Elizabeth Chang is active.

Publication


Featured researches published by Elizabeth Chang.


advanced information networking and applications | 2010

Cloud Computing: Issues and Challenges

Tharam S. Dillon; Chen Wu; Elizabeth Chang

Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, we aim to pinpoint the challenges and issues of Cloud computing. We first discuss two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing We then identify several challenges from the Cloud computing adoption perspective. Last, we will highlight the Cloud interoperability issue that deserves substantial further research and development.


international conference on industrial informatics | 2005

A survey of digital image watermarking techniques

Vidyasagar Potdar; Song Han; Elizabeth Chang

Watermarking, which belong to the information hiding field, has seen a lot of research interest. There is a lot of work begin conducted in different branches in this field. Steganography is used for secret communication, whereas watermarking is used for content protection, copyright management, content authentication and tamper detection. In this paper we present a detailed survey of existing and newly proposed steganographic and watermarking techniques. We classify the techniques based on different domains in which data is embedded. We limit the survey to images only.


Archive | 2005

Trust and Reputation for Service-Oriented Environments: Technologies For Building Business Intelligence And Consumer Confidence

Elizabeth Chang; Farookh Khadeer Hussain; Tharam S. Dillon

Preface. Author Introduction. Acknowledgement. Chapter 1 Trust and Security in Service-Oriented Envirnoments. Chapter 2 Trust Concepts and Trust Model. Chapter 3 Trustworthiness. Chapter 4 Trust Ontology for Service-Oriented Environment. Chapter 5 The Fuzzy and Dynamic Nature of Trust. Chapter 6 Trustworthiness Measure with CCCI. Chapter 7 Trustworthiness systems. Chapter 8 Reputation Concepts and the Reputation Model. Chapter 9 Reputation Ontology. Chapter 10 Reputation Calculation Methodologies. Chapter 11 Reputation Systems. Chapter 12 Trust and Reputation Prediction. Chapter 13 Trust and Reputation Modelling. Chapter 14 The Vision of Trust and Reputation Technology. References. Index.


ieee international conference on digital ecosystems and technologies | 2010

Conceptual SLA framework for cloud computing

Mohammed Alhamad; Tharam S. Dillon; Elizabeth Chang

Cloud computing has been a hot topic in the research community since 2007. In cloud computing, the online services are conducted to be pay-as-you-use. Service customers need not be in a long term contract with service providers. Service level agreements (SLAs) are agreements signed between a service provider and another party such as a service consumer, broker agent, or monitoring agent. Because cloud computing is a recent technology providing many services for critical business applications, reliable and flexible mechanisms to manage online contracts are very important. This paper presents the main criteria which should be considered at the stage of designing the SLA in cloud computing. Also, we investigate the negotiation strategies between cloud provider and cloud consumer and propose our method to maintain the trust and reliability between each of the parties involved in the negotiation process.


advanced information networking and applications | 2009

Wireless Sensor Networks: A Survey

Vidyasagar Potdar; Atif Sharif; Elizabeth Chang

Wireless Sensor Networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status. However these sensors operate under extreme energy constraints and are designed by keeping an application in mind. Designing a new wireless sensor node is extremely challenging task and involves assessing a number of different parameters required by the target application, which includes range, antenna type, target technology, components, memory, storage, power, life time, security, computational capability, communication technology, power, size, programming interface and applications. This paper analyses commercially (and research prototypes) available wireless sensor nodes based on these parameters and outlines research directions in this area.


ieee ies digital ecosystems and technologies conference | 2007

Digital Ecosystems: Principles and Semantics

Harold Boley; Elizabeth Chang

Digital ecosystems transcend the traditional, rigorously defined, collaborative environments from centralised, distributed or hybrid models into an open, flexible, domain cluster, demand-driven, interactive environment. A digital ecosystem is a newly networked architecture and collaborative environment that addresses the weakness of client-server, peer-to-peer, grid, and Web services. In this paper we provide an explanation of digital ecosystems, their analogy to ecological systems, architecture, swarm intelligence, and comparison to existing networked architecture. We then describe how digital ecosystems can benefit from semantic Web ontologies and rules. Finally, we discuss issues in the collaboration between semantically neighbouring digital ecosystems.


IEEE Transactions on Intelligent Transportation Systems | 2012

Neural-Network-Based Models for Short-Term Traffic Flow Forecasting Using a Hybrid Exponential Smoothing and Levenberg–Marquardt Algorithm

Kit Yan Chan; Tharam S. Dillon; Jaipal Singh; Elizabeth Chang

This paper proposes a novel neural network (NN) training method that employs the hybrid exponential smoothing method and the Levenberg-Marquardt (LM) algorithm, which aims to improve the generalization capabilities of previously used methods for training NNs for short-term traffic flow forecasting. The approach uses exponential smoothing to preprocess traffic flow data by removing the lumpiness from collected traffic flow data, before employing a variant of the LM algorithm to train the NN weights of an NN model. This approach aids NN training, as the preprocessed traffic flow data are more smooth and continuous than the original unprocessed traffic flow data. The proposed method was evaluated by forecasting short-term traffic flow conditions on the Mitchell freeway in Western Australia. With regard to the generalization capabilities for short-term traffic flow forecasting, the NN models developed using the proposed approach outperform those that are developed based on the alternative tested algorithms, which are particularly designed either for short-term traffic flow forecasting or for enhancing generalization capabilities of NNs.


Applied Soft Computing | 2007

Fuzzy trust evaluation and credibility development in multi-agent systems

Stefan Schmidt; Robert Steele; Tharam S. Dillon; Elizabeth Chang

E-commerce markets can increase their efficiency through the usage of intelligent agents which negotiate and execute contracts on behalf of their owners. The measurement and computation of trust to secure interactions between autonomous agents is crucial for the success of automated e-commerce markets. Building a knowledge sharing network among peer agents helps to overcome trust-related boundaries in an environment where least human intervention is desired. Nevertheless, a risk management model which allows individual customisation to meet the different security needs of agent-owners is vital. The calculation and measurement of trust in unsupervised virtual communities like multi-agent environments involves complex aspects such as credibility rating for opinions delivered by peer agents, or the assessment of past experiences with the peer node one wishes to interact with. The deployment of suitable algorithms and models imitating human reasoning can help to solve these problems. This paper proposes not only a customisable trust evaluation model based on fuzzy logic but also demonstrates the integration of post-interaction processes like business interaction reviews and credibility adjustment. Fuzzy logic provides a natural framework to deal with uncertainty and the tolerance of imprecise data inputs to fuzzy-based systems makes fuzzy reasoning especially attractive for the subjective tasks of trust evaluation, business-interaction review and credibility adjustment.


network-based information systems | 2010

SLA-Based Trust Model for Cloud Computing

Mohammed Alhamad; Tharam S. Dillon; Elizabeth Chang

Cloud computing is a new form of technology, which infrastructure, developing platform, software, and storage can be delivered as a service in a pay as you use cost model. However, for critical business application and more sensitive information, cloud providers must be selected based on high level of trustworthiness. In this paper, we present a trust model to evaluate cloud services in order to help cloud users select the most reliable resources. We integrate our previous work “conceptual SLA framework for cloud computing” with the proposed trust management model to present a new solution of defining the reliable criteria for the selection process of cloud providers


ACM Transactions on Information Systems | 2002

A semantic network-based design methodology for XML documents

Ling Feng; Elizabeth Chang; Tharam S. Dillon

The eXtensible Markup Language (XML) is fast emerging as the dominant standard for describing and interchanging data among various systems and databases on the Internet. It offers the Document Type Definition (DTD) as a formalism for defining the syntax and structure of XML documents. The XML Schema definition language, as a replacement for the DTD, provides more rich facilities for defining and constraining the content of XML documents. However, it does not concentrate on the semantics that underlies these documents, representing a logical data model rather than a conceptual model. To enable efficient business application development in large-scale electronic commerce environments, it is necessary to describe and model real-world data semantics and their complex interrelationships. In this article, we describe a design methodology for XML documents. The aim is to enforce XML conceptual modeling power and bridge the gap between software development and XML document structures. The proposed methodology is comprised of two design levels: the semantic level and the schema level. The first level is based on a semantic network, which provides semantic modeling of XML through four major components: a set of atomic and complex nodes, representing real-world objects; a set of directed edges, representing semantic relationships between the objects; a set of labels denoting different types of semantic relationships, including aggregation, generalization, association, and of-property relationships; and finally a set of constraints defined over nodes and edges to constrain semantic relationships and object domains. The other level of the proposed methodology is concerned with detailed XML schema design, including element/attribute declarations and simple/complex type definitions. The mapping between the two design levels is proposed to transform the XML semantic model into the XML Schema, based on which XML documents can be systematically created, managed, and validated.

Collaboration


Dive into the Elizabeth Chang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Omar Khadeer Hussain

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Morteza Saberi

Australian Defence Force Academy

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge