NPS Australia Submission System
Efficiently Using Deep Learning to Distinguish Early-Stage Hepatocellular Carcinoma (HCC) from non-HCC Based on Multi-Phase CT and Image Enhancement

This study uses image enhancement methods to analyze liver nodule progression and radiological features in liver cancer development. A detection strategy has been developed from CT image characteristics for early identification of liver cancer. The study also explores how the size of nodules influences detection accuracy and classification between benign and malignant types, which is vital for refining detection algorithms and improving diagnostic precision.

DuoDistill: A Dual Knowledge Distillation Framework for Optimizing Top-K Recommender Systems

This work presents a novel knowledge distillation framework that utilizes multiple intermediated assistant models of varying sizes and architectures to facilitate knowledge transfer from a teacher (source) model to a student (target) model.

GeoStoryTelling

Health scientists argue that understanding the local leads to effective interventions

Despite these benefits, most researchers keep foregoing this valuable geo-resource

Specialized training and lack of no-code software are barriers for geocontextalizing

We address this issue by offering a user-friendly software to understand the local

GeoStoryTelling handles multi-media inputs to provide context/nuance in HTML outputs

We offer access to a freeware and data that illustrates the process to conduct the analyses proposed

Deniable Authentication Protocol Based on Chebyshev Polynomial over GF(q)

Deniable authentication protocol enable a recipient to verify the authenticity of a received message while keeping the sender’s identity hidden from any third parties. Compared to interactive protocol, non-interactive approaches offer improved efficiency by reducing authentication overhead. This advantage has led to the proposal of numerous non-interactive deniable authentication protocols. Hence, an idea come up to develop a deniable authentication protocol that is non-interactive, secure and efficient. This paper introduces the development of deniable authentication protocol based on Chebyshev Polynomial over GF(q). An enhancement rooted in the Chebyshev Polynomial over finite fields is proposed, since Chebyshev Polynomial over GF(q) provides security of the algorithm rely on the difficulty of computing discrete logarithms over finite fields together with fast execution time. Concurrently, the proposed protocol exhibits characteristics of completeness, deniability, resistance to forgery, impersonation and man-in-the-middle attacks that has been proved.

An Efficient Algorithm for Finding the Longest Common Almost Wave

Numeric sequences often exhibit similar behaviors or trends, such as fluctuations in electrocardiograms and stock values that resemble waves. This paper attempts to find the longest common almost wave subsequence between two numeric sequences A and B within at most r segments. This new problem is a more generalized variant of the longest increasing subsequence and the longest wave subsequence problems. We present the formal definition of this new problem, and propose an efficient algorithm to solve it. With this new theoretical result, it may be helpful to study related real-world problems, such as fluctuations in electrocardiograms or stock price prediction.

Reliability-considered Multi-platoon’s Groupcasting using the Resource Sharing Method

In the context of 5G platoon communications, the Platoon Leader Vehicle (PLV) employs groupcasting to transmit control messages to Platoon Member Vehicles (PMVs). Due to the restricted transmission power for groupcasting, it may need to pick one PMV as the Platoon Relay Vehicle (PRV) to be responsible for re-groupcasting PLV’s messages. To optimize the use of limited spectrum resources, resource sharing is implemented to enhance spectrum efficiency within the platoon. This study proposes a resource allocation method, which is called Resource Sharing for Platoon Groupcasting (RSPG), for platoon’s groupcasting based on transmission reliability. RSPG utilizes the tripartite matching to assign a subchannel to either a PLV or PRV that shares the assigned subchannel with the corresponding individual entity (IE), which does not belong to any platoon. The simulation results shown that the proposed method has the better performance in terms of IEs’ QoS satisfaction rate, the allocated subchannels for platoons, and spectral efficiency.

The Impact of Global Data Protection Laws on Cybersecurity Landscape

This paper aims to explore the global data protec- tion laws and regulations influence the cybersecurity landscape, focusing more on the role of the Saudi Personal Data Protection Law (PDPL). The overwhelming digital threats evolve and data breaches become more sophisticated. The privacy laws and rigorous regulations measures can play a crucial role in the broader cybersecurity landscape. There are several international data protection regulations have been developed such as Saudi Arabia’s PDPL, EU GDPR, China’s PIPL, and USA’s (CCPA) to enhance the protection of personal data and establish regulatory frameworks that manage personal data collection, processing, and storage. The paper argues that while privacy laws face vari- ous compliance obstacles, they lead to the advancement of global cybersecurity practices, enhancement of global cybersecurity protocols, and fortification of cross-border cooperation against cyber adversities. The impact study of the global privacy laws and regulations has been conducted considering the dynamic re- lationship between data protection legislation and cybersecurity. This can offer valuable insights for policymakers, practitioners, and researchers navigating the cybersecurity landscape.