Zhongwei Zhang

Zhongwei Zhang
University of Southern Queensland 

About

84
Publications
14,604
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
508
Citations
Introduction
Skills and Expertise

Publications

Publications (84)
Article
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC)and elliptic curve digital signature algorithm (ECDSA) have been attracting attention frommany researchers in different institutions because these algorithms provide security andhigh performance when being used in many areas such as electronic-healthcare, electronicbank...
Chapter
There were an increasing number of innovative applications of Wireless Sensor Networks (WSNs) in health care domain. It has never been such clearer to appreciate the advantages and benefits of applying the WSNs to improve the quality of health care in a wide variety of areas. Thanks to the sensing and communications technology of today, it has also...
Chapter
Supporting a mechanism to authenticate members in electronic health record (EHR) is a fundamental procedure to prevent different threats from penetrating patients' identities/data. Existing authentication schemes still suffer from security drawbacks. Exchanging medical-related information/data between clients and the servers leaves them compromised...
Preprint
Full-text available
The emergence of video applications and video capable devices have contributed substantially to the increase of video traffic on Internet. New mechanisms recommending video rate adaptation towards delivering enhanced Quality of Experience (QoE) at the same time making room for more sessions. This paper introduces a cross-layer QoE-aware architectur...
Preprint
Full-text available
The emergence of video applications and video capable devices have contributed substantially to the increase of video traffic on Internet. New mechanisms recommending video rate adaptation towards delivering enhanced Quality of Experience (QoE) at the same time making room for more sessions. This paper introduces a cross-layer QoE-aware architectur...
Preprint
Full-text available
div>The rapid shift toward video on-demand and real time information systems has affected mobile as well as wired networks. The research community has placed a strong focus on optimizing the Quality of Experience (QoE) of video traffic, mainly because video is popular among Internet users. Techniques have been proposed in different directions towar...
Preprint
Full-text available
div>The rapid shift toward video on-demand and real time information systems has affected mobile as well as wired networks. The research community has placed a strong focus on optimizing the Quality of Experience (QoE) of video traffic, mainly because video is popular among Internet users. Techniques have been proposed in different directions towar...
Preprint
The emergence of video applications and video capable devices have contributed substantially to the increase of video traffic on Internet. New mechanisms recommending video rate adaptation towards delivering enhanced Quality of Experience (QoE) at the same time making room for more sessions. This paper introduces a cross-layer QoE-aware architectur...
Preprint
Full-text available
The popularity of the video services on the Internet has evolved various mechanisms that target the Quality of Experience (QoE) optimization of video traffic. The video quality has been enhanced through adapting the sending bitrates. However, rate adaptation alone is not sufficient for maintaining a good video QoE when congestion occurs. This paper...
Preprint
Full-text available
Transmission of video traffic over the Internet has grown exponentially in the past few years with no sign of waning. This increasing demand for video services has changed user expectation of quality. Various mechanisms have been proposed to optimise the Quality of Experience (QoE) of end users’ video. Studying these approaches are necessary for ne...
Preprint
Full-text available
Transmission of video traffic over the Internet has grown exponentially in the past few years with no sign of waning. This increasing demand for video services has changed user expectation of quality. Various mechanisms have been proposed to optimise the Quality of Experience (QoE) of end users’ video. Studying these approaches are necessary for ne...
Preprint
Full-text available
The popularity of the video services on the Internet has evolved various mechanisms that target the Quality of Experience (QoE) optimization of video traffic. The video quality has been enhanced through adapting the sending bitrates. However, rate adaptation alone is not sufficient for maintaining a good video QoE when congestion occurs. This paper...
Preprint
Low power wide area (LPWA) technologies are strongly recommended as the underlying networks for Internet of things (IoT) applications. They offer attractive features, including wide-range coverage, long battery life and low data rates. This paper reviews the current trends in this technology, with an emphasis on the services it provides and the cha...
Preprint
Full-text available
div>Low-power wide area (LPWA) technologies are strongly recommended as the underlying networks for Internet of Things (IoT) applications. They offer attractive features, including wide-range coverage, long battery life, and low data rates. This paper reviews the current trends in this technology, with an emphasis on the services it provides and...
Preprint
Full-text available
div>Low-power wide area (LPWA) technologies are strongly recommended as the underlying networks for Internet of Things (IoT) applications. They offer attractive features, including wide-range coverage, long battery life, and low data rates. This paper reviews the current trends in this technology, with an emphasis on the services it provides and...
Preprint
Full-text available
With the inevitable dominance of video traffic on the Internet, providing perceptually good video quality is becoming a challenging task. This is partly due to the bursty nature of video traffic, changing network conditions and limitations of network transport protocols. This growth of video traffic has made Quality of Experience (QoE) of the end u...
Preprint
Full-text available
With the inevitable dominance of video traffic on the Internet, providing perceptually good video quality is becoming a challenging task. This is partly due to the bursty nature of video traffic, changing network conditions and limitations of network transport protocols. This growth of video traffic has made Quality of Experience (QoE) of the end u...
Preprint
Full-text available
With the inevitable dominance of video traffic on the Internet, providing perceptually good video quality is becoming a challenging task. This is partly due to the bursty nature of video traffic, changing network conditions and limitations of network transport protocols. This growth of video traffic has made Quality of Experience (QoE) of the end u...
Article
Full-text available
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliab...
Article
Full-text available
Electronic health record (EHR) systems are extremely useful for managing patients' data and are widely disseminated in the health sector. The main problem with these systems is how to maintain the privacy of sensitive patient information. Due to not fully protecting the records from unauthorised users, EHR systems fail to provide privacy for protec...
Article
Full-text available
Providing a mechanism to authenticate users in healthcare applications is an essential security requirement to prevent both external and internal attackers from penetrating patients’ identities and revealing their health data. Many schemes have been developed to provide authentication mechanisms to ensure that only legitimate users are authorised t...
Preprint
Full-text available
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been attracting attention from many researchers in different institutions because these algorithms provide security and high performance when being used in many areas such as electronic-healthcare, electronic-...
Preprint
Full-text available
Providing a mechanism to authenticate users in healthcare applications is an essential security requirement to prevent both external and internal attackers from penetrating patients' identities and revealing their health data. Many schemes have been developed to provide authentication mechanisms to ensure that only legitimate users are authorized t...
Article
Full-text available
Low power wide area (LPWA) technologies are strongly recommended as the underlying networks for Internet of things (IoT) applications. They offer attractive features, including wide-range coverage, long battery life and low data rates. This paper reviews the current trends in this technology, with an emphasis on the services it provides and the cha...
Article
The popularity of the video services on the Internet has evolved various mechanisms that target the Quality of Experience (QoE) optimization of video traffic. The video quality has been enhanced through adapting the sending bitrates. However, rate adaptation alone is not sufficient for maintaining a good video QoE when congestion occurs. This paper...
Article
With the inevitable dominance of video traffic on the Internet, providing perceptually good video quality is becoming a challenging task. This is partly due to the bursty nature of video traffic, changing network conditions, and limitations of network transport protocols. This growth of video traffic has made quality of experience (QoE) of the end...
Article
The growing demand for video applications and services has contributed substantially to the increase of video traffic on the Internet. Measurement-based admission control was proposed with the primary aim of eliminating or reducing the need of flow state information; also to control overhead for admission decision and maximize utilization at the po...
Article
With recent developments in wireless networks field and in sensing technology, new and innovative medical applications based on the wireless sensor networks (WSN) technology are being developed in the research lab or commercial sectors. The key problem of WSN based application in the medical and health care domain is to get the message with the bou...
Conference Paper
The emergence of video applications and video capable devices have contributed substantially to the increase of video traffic on Internet. New mechanisms recommending video rate adaptation towards delivering enhanced Quality of Experience (QoE) at the same time making room for more sessions. This paper introduces a cross-layer QoE-aware architectur...
Conference Paper
Smart and affordable medical and health care have been always described as a dream coming true despite the ever growing cost of providing such care services to hospitals and nursing homes. Pervasive sensing and wireless networking technology possess the potential to the provisions of quality medical or health care with relatively lower cost. One of...
Conference Paper
Wireless Underground Sensor Networks (WUSN) using Electro-Magnetic (EM) wave communication has to address the challenges posed by the underground environment. An alternative to EM wave communication for WUSN is Magnetic Induction (MI). This research aims to study the possibility of using MI communication for WUSN designed for irrigation control in...
Article
Full-text available
Despite the widespread uses in military, smart building, habitat monitoring, Wireless sensor networks (WSNs) just begun showing their superiority in the medical and healthcare domain. Facing same challenges as other applications, deployment of WPANs in medical domain exert many more stringent requirements, due to the nature of high accessibility an...
Conference Paper
Wireless Underground Sensor Networks (WUSN) using Electro-Magnetic (EM) wave communication has to address the challenges posed by the underground environment. An alternative to EM wave communication for WUSN is Magnetic Induction (MI). This research aims to study the possibility of using MI communication for WUSN designed for irrigation control in...
Conference Paper
Though, Wireless Sensor Networks have many successful applications in military, smart building, habitat monitoring, etc. it just begun to show its superiority in the medical domain in recent years. Deployment of WSNs in medical domain exert many more stringent requirements on the capability of sensing and in-networking processing, due to the nature...
Conference Paper
Full-text available
Application of Wireless Sensor Networks (WSN) in many fields has achieved a significant advances, many research can be seen in military, industrial control surveillance, and bush fire and wild habitant monitoring, However, it is a bit too early to claim the application of WSN in the domain of Medicine and Healthcare (M&HC) a big success. The major...
Chapter
Full-text available
Mobile Ad Hoc Network(MANETs)is a promising new wireless communications paradigm, with two features that there is no need to have a centralized server and the mobility of the network device, which enable the network devices move around and end hosts may function as a router. The key of successful deployments of MANETs requires us to properly addres...
Conference Paper
Full-text available
A wide range of emerging real-time services (e.g. VoIP, video conferencing, video-on-demand) require different levels of Quality of Services (QoS) guarantees over wireless networks. Scheduling algorithms play a key role in meeting these QoS requirements. A distinction of QoS guarantees is made between deterministic and statistical guarantees. Most...
Conference Paper
Full-text available
A wide range of emerging real-time services require different levels of Quality of Services (QoS) guarantees over wireless networks. Scheduling algorithms play a key role in meeting these QoS requirements. Most of research in this area have been focused on deterministic delay bounds and the statistical bounds of differentiated real-time services ar...
Conference Paper
Full-text available
While medical instruments have benefited a great deal from the technological advances of the couple of decades, many practices and day-to-day activities in medical environments remain virtually unchanged. The process of penetrating IT advancements in the medical profession continues to be a very challenging problem. This is mainly due to concerns a...
Conference Paper
Full-text available
Microarray data usually contains a high level of noisy gene data, the noisy gene data include incorrect, noise and irrelevant genes. Before Microarray data classification takes place, it is desirable to eliminate as much noisy data as possible. An approach to improving the accuracy and efficiency of Microarray data classification is to make a small...
Article
Apart from the dimensionality problem, the uncertainty of Microarray data quality is another major challenge of Microarray classification. Microarray data contain various levels of noise and quite often high levels of noise, and these data lead to unreliable and low accuracy analysis as well as high dimensionality problem. In this paper, we propose...
Conference Paper
Full-text available
Service routing across multiple network domains often requires redirection of service requests. Service request redirection can be achieved with multiple single hop redirection as in Session Initiation Protocol (SIP) or as a single redirection of multiple hops as in Service Network Graph (SNG). For efficiency and manageability, it is desirable to h...
Conference Paper
Wireless sensor networks (WSNs) have been regarded as an incarnation of ad hoc networks for a specific application. Since a WSN consists of potentially hundreds of low cost, small size and battery powered sensor nodes, it has more potentials than a MANET to be deployed in many emerging areas. But they also raised many new challenges and these chall...
Conference Paper
Full-text available
Inter domain service routing is an element in the suc- cess of Next Generation Network. Service requests, such as the INVITE request in Session Initiation Protocol (21) may need to be redirected. Service Path (SPath) can be used to hold the server paths and service information. The length of SPath increases as the number of hops in a redirection in...
Conference Paper
Full-text available
An ad hoc network is a peer-to-peer network without no centralised server. Mobile ad hoc network(MANETs) is a promising new wireless communications paradigm in which network device may move around and end hosts may function as a router. It is a key of success of being deployed to properly address the security problems. Although many research focus...
Conference Paper
A wide range of emerging multimedia services (e.g. IP telephony, video conferencing, video-on-demand) require Quality of Services (QoS) guarantees in both wired and wireless networks. Adaptive QoS provisioning and control are especially necessary to meet the QoS requirements in dynamic heterogeneous multi-hop wireless networks. This paper proposed...
Conference Paper
Full-text available
Service network graph (SNG) was proposed as a network service sharing infrastructure to support secure services on dynamic aggregation of heterogeneous networks. To participate in SNG, a network has to share a secret key with one member of the SNG. The shared secret key will be used to set up an encrypted channel between the network and the SNG mem...
Conference Paper
Full-text available
There are many applications of large scale sensor networks in which both the stimulus and the data collection stations are mobile (i.e. animal tracking, battlefield chasing). TTDD is a scalable and energy-efficient data dissemination model designed for this type of scenarios. However, TTDD only focused on handling mobile sinks. In this paper, we ex...
Conference Paper
Full-text available
To increase the lifetime of the sensor networks, a recognized method is to switch off/on some sensor nodes between "sleep" and "activity" mode in order to save the energy. The performance metrics of an individual node can be calculated by using its DTMC model, the theoretical results include the average number of data units generated in a time slot...
Article
In a real world bilevel decision-making, the lower level of a bilevel decision usually involves multiple decision units. This paper proposes the Kth-best approach for linear bilevel multifollower programming problems with shared va riables among followers. Finally a numeric example is given to show how the Kth-best approach works.
Article
Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of any fixed infrastructure in mobile ad-hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. The discovery and maintenance of secure route is the most flinty challenge....
Article
Full-text available
TCP Vegas is a proactive congestion control mechanism proposed to improve TCP performance by using Round Trip Time (RTT) as a main parameter to monitor traffic condition and avoid congestion. However, TCP Vegas does not perform well on bidirectional links with unbalanced traffic, and on wireless links. A simple Single-Trip Time (STT) based modifica...
Conference Paper
Sharing of services among wired and wireless networks provides users with more variety of services. In this paper, we concentrate on how to achieve secure service sharing for mobile users in an aggregation of heterogeneous networks. Our approach is to extended the service network graph (SNG) concept to handle mobile users rambling within a guest ne...
Conference Paper
A new innovative deployment of wireless technology is mobile ad hoc network (MANET). A MANET is characterized by no fixed infrastructure or varying topologized structure. This feature allows MANET to be deployed within many circumstances where traditional IP networks are constrained or too expensive in terms of time and resources. Adversely, the mo...
Conference Paper
E-Commerce has been much more popular in western countries where the development of E-Commerce systems has been relatively matured. While the technology and social credit environment are well developed, E-Commerce is relatively new and receives less acceptance within commercial industries in China. Building trust has been identified as one of the m...
Conference Paper
The layering technique has divided TCP/IP protocols into a few layers and assigned each layer with some special functionality. The mechanism of flow and congestion control in TCP at the transport layer can be dispersed to IP at the network layer where there used to be a simple strategy (ie. drop-tail) of managing the router's buffer. Active queue m...
Conference Paper
Full-text available
On-line trading or Internet Commerce restoring to E- Commerce systems are gradually replacing the traditional commerce activities. Internet users must have reasonable faith on the underlying systems before comfortably using it, To convince users to confidently enjoy the benefits that In- ternet and E-commerce systems can bring, an E-commerce system...
Article
Full-text available
Stream Control Transmission Protocol(SCTP) is a re- liable transport protocol combining the advantages of TCP and UDP. SCTP has many desirable features in- cluding multihoming, multistreaming, and partial data reliability. These features have made SCTP perform much more effectively in multimedia networking appli- cations. They have also worked bett...
Conference Paper
Significant efforts in developing active queue management (AQM) in gateway routers in a TCP/IP network have been made since random early detection (RED) in 1993, and most of them are statistical based. Our approach is to capitalize on the understanding of the TCP dynamics to design an effective AQM scheme. In this paper, two FL-based AQM algorithms...
Chapter
Full-text available
The work presented in this paper is the design and implementation of an intelligent strategy using fuzzy logic technology to gauge the TCP timeout and retransmission value. The conventional algorithms, which are based on statistical analysis, perform in a marginally acceptable way for estimating theses two values. But they have been shown to be inc...
Article
Full-text available
When a user requests a service from a server (SA), SA will authenticate the user based on some stored authentication information. If the information is stored on another server or network which is not accessible to SA or not in a compatible form of that required by SA, the identity of the user cannot be established. Without a global authentication...
Conference Paper
Full-text available
Most of network management systems adhere to the centralized and passive approach. For large and heterogeneous multimedia networks, the centralized approach are increasingly incapable of providing required and efficient management and of measuring up to requirements of some emerging services. What come after that is the distributed approach which r...
Article
Full-text available
Though being centralized, traditional approaches of network management have accomplished their overall mission that is to provide efficient management of underlying heterogeneous distributed networks. However the size of networks has been growing, and so has the number of novel applications and protocols running on the networks. These new services...
Article
Full-text available
Adaptive RED (ARED) is an active queue management (AQM) designed for congestion responsive traffics such as TCP. ARED aims to keep average queue length around a predefined queue length. If so, average delay will be offered to Internet users and simultaneously high link utilization will be achieved. However, ARED algorithm merely makes the average q...
Conference Paper
In car body design, reflection lines of automotive body surface have been used to identify and remove the bump or irregular curves on the outer skin surfaces of car body. Traditional approaches to correcting such reflection lines involve tedious manual work and expensive computation. They also rely heavily on designers' experiences. This paper expl...
Conference Paper
Information visualization has been formalised as a continuous process of displaying information on computers. Information visualization systems used today are comprised of control and learning processes, however, they suffer from the incapability to automated job completion at the right time. Intelligent agents and multi-agent techniques have been...
Conference Paper
Electronic commerce is a new way of trading on the increasingly popular computer network, Internet. Electronic commerce has rapidly become a major player in the business market. There is a need for business entities to utilise electronic commerce, and security must also be considered. Transactions in electronic commerce involve the transmission of...
Conference Paper
The method of smoothing surfaces by correcting reflection lines which is commonly used in the car design industry, relies heavily on the experience of designers and often involves very tedious work. This paper discusses how genetic algorithms can be used to alleviate this problem by providing alternative solutions under suitable constraints set by...
Conference Paper
The soft computing techniques have been introduced in image processing in recent years and a number of promising results have been achieved. In this paper, two new techniques based on soft computing have been proposed to restore images that are degraded by blur and noise. The first technique is based on hierarchical fuzzy logic and the second is ba...
Conference Paper
Fast fuzzy filtering (FFF), based on fuzzy logic, is a new technique for detail-preserving smoothing of noisy image data. This paper shows how a hierarchical fuzzy approach can be used to perform detail sharpening of an image corrupted by noise. Results of computer simulation show that the proposed fuzzy approach performs better for further reducti...
Conference Paper
A new technique based a genetic algorithm is proposed in this paper to find the optimal value of the ratio Γ, which is a priori knowledge of the signal-to-noise ratio, in the Wiener filter for image restoration. The proposed method can be used in a control experiment in conjunction with any image-quality-assessment measure in order to obtain the op...
Conference Paper
In this paper, the neuro-fuzzy technology is considered to model and control an adaptive information visualisation system. Three kinds of neural network used are: a general regression neural network (GRNN), a Kohonen's self-organized feature map (SOFM), and a fuzzy perceptron. The GRNN has been used to constantly predict the time of the redisplay d...
Conference Paper
In this paper, an optimization technique using the Genetic Algorithm has been proposed to find the optimal value of the ratio Γ, which is a priori knowledge of the signal-to-noise ratio, in the Wiener filter to image restoration. The proposed method is suitable and effective for control experiments in conjunction with any image-quality-assessment m...
Article
Full-text available
In this paper we propose a new verifier-based password authentication protocol us-ing Dynamic Passwords. The protocol features mutual authentication, integrated session key exchange and is resistant to both dictionary attacks and replay attacks. It also reveals any suc-cessful spoofing. The protocol achieves these features by using one-way hash fun...
Article
Full-text available
When a service server receives a request, the server will establish the identity and authorization of the user based on the information stored in authentication information repository (IDAR) before service is provided. The IDAR will determine who can have access to which service. A legitimate user must have her/his identity and authorization regist...

Network

Cited By