Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Wollongong

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1711 - 1740 of 4868

Full-Text Articles in Physical Sciences and Mathematics

Controlling For Method Bias: A Critique And Reconceptualization Of The Marker Variable Technique, Philip Yetton, Rajeev Sharma, Jeff Crawford Jan 2011

Controlling For Method Bias: A Critique And Reconceptualization Of The Marker Variable Technique, Philip Yetton, Rajeev Sharma, Jeff Crawford

Faculty of Informatics - Papers (Archive)

The marker variable technique is an easy-to-use technique for estimating the magnitude of method bias within a study. However, its validity has not yet been established. This paper addresses three issues assessing the validity of the technique and finds that it is subject to significant validity threats. A redefinition of the marker variable correlation is proposed, which partly addresses the theoretical critiques of the technique. The findings confirm Podsakoff et al.’s (2003) critique that the marker variable technique does not capture key sources of method bias. Implications of the findings for estimating and controlling for method bias within individual studies …


Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma Jan 2011

Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma

Faculty of Informatics - Papers (Archive)

Business analytics can potentially create value and improve competitive advantage for firms. We argue that dynamic and operational capabilities, enabled by business analytics technology, lead to improved firm performance. We develop a process-oriented theoretical framework that explains how dynamic and operational capabilities interact over time to create value. We use the framework to explain how business value was achieved from business analytics systems in a case study at a financial institution. A number of implications of the study are discussed and suggestions for future work are provided.


Improving Knowledge Sharing Behaviour Within Organizations: Towards A Model, Marion Zalk, Rachelle Bosua, Rajeev Sharma Jan 2011

Improving Knowledge Sharing Behaviour Within Organizations: Towards A Model, Marion Zalk, Rachelle Bosua, Rajeev Sharma

Faculty of Informatics - Papers (Archive)

Knowledge management is the process of capturing, storing, sharing and using organizational knowledge with the aim of improving organizational performance. A necessary precursor for successful knowledge management initiatives is knowledge exchange between employees. This exchange is voluntary and highly dependent on an individual’s willingness to share his/her knowledge. It thus becomes important to identify the factors motivating employees to share their knowledge. This research in progress draws on Locke and Latham’s Goal Setting Theory (1990) to propose a model explaining knowledge sharing behavior.


The Amicable-Kronecker Construction Of Quaternion Orthogonal Designs, Jennifer Seberry, Sarah S. Adams Jan 2011

The Amicable-Kronecker Construction Of Quaternion Orthogonal Designs, Jennifer Seberry, Sarah S. Adams

Faculty of Informatics - Papers (Archive)

Recently, quaternion orthogonal designs (QODs) were introduced as a mathematical construct with the potential for applications in wireless communications. The poten- tial applications require new methods for constructing QODs, as most of the known methods of construction do not produce QODs with the exact properties required for implementation in wireless systems. This paper uses real amicable orthogonal designs and the Kronecker product to construct new families of QODs. The proposed Amicable- Kronecker Construction can be applied to build quaternion orthogonal designs of a variety of sizes and types. Although it has not yet been simulated whether the result- ing designs …


Lifespan Theorem For Constrained Surface Diffusion Flows, James Mccoy, Glen Wheeler, Graham Williams Jan 2011

Lifespan Theorem For Constrained Surface Diffusion Flows, James Mccoy, Glen Wheeler, Graham Williams

Faculty of Informatics - Papers (Archive)

We consider closed immersed hypersurfaces in R^3 and R^4 evolving by a class of constrained surface diffusion flows. Our result, similar to earlier results for the Willmore flow, gives both a positive lower bound on the time for which a smooth solution exists and a small upper bound on a power of the total curvature during this time. By phrasing the theorem in terms of concentration of curvature in the initial surface, our result holds for very general initial data and has applications to further development in asymptotic analysis for these flows.


Positioning Rfid Technology Into The Innovation Theory Landscape: A Multidimensional Perspective Integrating Case Study Approach, Samuel Fosso Wamba Jan 2011

Positioning Rfid Technology Into The Innovation Theory Landscape: A Multidimensional Perspective Integrating Case Study Approach, Samuel Fosso Wamba

Faculty of Informatics - Papers (Archive)

The main objective of this paper is to analyze RFID technology as an innovation concept through the lens of the diffusion of innovation theory. Drawing on the extant literature on the diffusion of innovations –with an emphasis on innovation classifications and the “open innovation”–, as well as on an analysis of a longitudinal case study conducted in a Canadian beverage supply chain currently exploring the potential of RFID technology, this research study suggests that RFID technology is a multidimensional concept than encompasses the traditional classifications of innovations (e.g., technological and organizational innovation, product and process innovation, incremental and radical innovation, …


Guest Editorial For The Special Issue On Rfid-Enabled Healthcare: Applications, Issues And Benefits, S. F. Wamba Jan 2011

Guest Editorial For The Special Issue On Rfid-Enabled Healthcare: Applications, Issues And Benefits, S. F. Wamba

Faculty of Informatics - Papers (Archive)

Information technology (IT)-enabled healthcare is an area of interest for scholars from various fields of research (Fichman et al. 2011). Lately, radio frequency identification (RFID) technology emerged as a new multidimensional IT innovation (Fosso Wamba 2011) with a tremendous research potential in the healthcare sector. However, the current level of articles published on RFID-enabled healthcare is still fairly low. For example, a review of articles on RFID technology by (Ngai et al. 2008) showed that only 3.6% of articles were concerned with applications, issues and benefits related to the healthcare sector. The main objective of this special issue was to …


Automatic Classification Of Ground-Penetrating-Radar Signals For Railway-Ballast Assessment, Wenbin Shao, Abdesselam Bouzerdoum, Son Lam Phung, Lijun Su, Buddhima Indraratna, Cholachat Rujikiatkamjorn Jan 2011

Automatic Classification Of Ground-Penetrating-Radar Signals For Railway-Ballast Assessment, Wenbin Shao, Abdesselam Bouzerdoum, Son Lam Phung, Lijun Su, Buddhima Indraratna, Cholachat Rujikiatkamjorn

Faculty of Informatics - Papers (Archive)

The ground-penetrating radar (GPR) has been widely used in many applications. However, the processing and interpretation of the acquired signals remain challenging tasks since an experienced user is required to manage the entire operation. In this paper, we present an automatic classification system to assess railway-ballast conditions. It is based on the extraction of magnitude spectra at salient frequencies and their classification using support vector machines. The system is evaluated on real-world railway GPR data. The experimental results show that the proposed method efficiently represents the GPR signal using a small number of coefficients and achieves a high classification rate …


Strategic Alignment Of Business Processes, Evan D. Morrison, A. K. Ghose, H. K. Dam, K. G. Hinge, K. Hoesch-Klohe Jan 2011

Strategic Alignment Of Business Processes, Evan D. Morrison, A. K. Ghose, H. K. Dam, K. G. Hinge, K. Hoesch-Klohe

Faculty of Informatics - Papers (Archive)

Strategic alignment is a mechanism by which an organization can visualize the relationship between its business processes and strategies. It enables organizational decision makers to collect meaningful insights based on their current processes. Currently it is difficult to show the sustainability of an organization and to determine an optimal set of processes that are required for realizing strategies. Further, there is not a general framework for strategic alignment that can ease this problem. In this article, we propose such a general framework for strategic alignment, which helps develop a clear understanding of the relationships between strategies and business processes. The …


A New Generic Digital Signature Algorithm, Jennifer Seberry, Vinhbuu To, Dongvu Tonien Jan 2011

A New Generic Digital Signature Algorithm, Jennifer Seberry, Vinhbuu To, Dongvu Tonien

Faculty of Informatics - Papers (Archive)

In this paper, we study two digital signature algorithms, the DSA and ECDSA, which have become NIST standard and have been widely used in almost all commercial applications. We will show that the two algorithms are actually ‘the same’ algebraically and propose a generic algorithm such that both DSA and ECDSA are instances of it. By looking at this special angle through the generic algorithm, we gain a new insight into the two algorithms DSA and ECDSA. Our new proposed digital signature algorithm is described generically using a group G and a map toNumber : G → Z. As an …


Online Grocery Systems Design Through Task Analysis, Mark Freeman, Alison Freeman Jan 2011

Online Grocery Systems Design Through Task Analysis, Mark Freeman, Alison Freeman

Faculty of Informatics - Papers (Archive)

Purpose – Modelling users’ interactions online is envisaged to allow developers to increase the usability of online systems and will aid system developers in building better systems to meet users’ needs, hereby creating better system design processes. Design/methodology/approach – The normative task model that was developed in this paper was created through an expert review of 14 online grocery stores, using a reverse engineering technique to model the features of the stores’ ordering process. Findings – The research identified three main areas of user experience when undertaking the process of adding a product to an online trolley: attempting to retrieve …


Modelling Carbon Nanostructures For Filtering And Adsorbing Polycyclic Aromatic Hydrocarbons, Thien Tran-Duc, Ngamta Thamwattana Jan 2011

Modelling Carbon Nanostructures For Filtering And Adsorbing Polycyclic Aromatic Hydrocarbons, Thien Tran-Duc, Ngamta Thamwattana

Faculty of Informatics - Papers (Archive)

The discovery of carbon nanostructures, such as graphene and carbon nanotubes, has led to the creation of many novel nano-devices. In this paper, we consider an environmental application of carbon nanostructures for filtering and adsorbing polycyclic aromatic hydrocarbons (PAHs) which are environmental pollutants. We mathematically investigate the adsorption of PAHs onto a graphene sheet and determine the underlying mechanisms of suction of PAHs into a carbon nanotube. We adopt a continuum approach together with the semi-empirical Lennard-Jones potential to determine van der Waals interaction forces and energies. Results obtained here for certain PAHs are well in agreement with existing experimental …


Piloting A Logic-Based Framework For Understanding Organisational Change Process For A Health It Implementation, Kieren Diment, Karin Garrety, Ping Yu Jan 2011

Piloting A Logic-Based Framework For Understanding Organisational Change Process For A Health It Implementation, Kieren Diment, Karin Garrety, Ping Yu

Faculty of Informatics - Papers (Archive)

This paper describes how a method for evaluating organisational change based on the theory of logical types can be used for classifying organisational change processes to understand change after the implementation of an electronic documentation system in a residential aged care facility. In this instance we assess the organisational change reflected by care staff's perceptions of the benefits of the new documentation system at one site, at pre-implementation, and at 12 months post-implementation. The results show how a coherent view from the staff as a whole of the personal benefits, the benefits for others and the benefits for the organization …


Pedestrian Sensing Using Time-Of-Flight Range Camera, Xue Wei, Son Lam Phung, Abdesselam Bouzerdoum Jan 2011

Pedestrian Sensing Using Time-Of-Flight Range Camera, Xue Wei, Son Lam Phung, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

This paper presents a new approach to detect pedestrians using a time-of-flight range camera, for applications in car safety and assistive navigation of the visually impaired. Using 3-D range images not only enables fast and accurate object segmentation and but also provides useful information such as distances to the pedestrians and their probabilities of collision with the user. In the proposed approach, a 3-D range image is first segmented using a modified local variation algorithm. Three state-of-the-art feature extractors (GIST, SIFT, and HOG) are then used to find shape features for each segmented object. Finally, the SVM is applied to …


Towards Knowledge Management In Sports Event Management: Context Analysis Of Malaysian Biannual Games With Commonkads, Azizul Rahman Abdul Ghaffar, Ghassan Beydoun, Jun Shen, William Tibben Jan 2011

Towards Knowledge Management In Sports Event Management: Context Analysis Of Malaysian Biannual Games With Commonkads, Azizul Rahman Abdul Ghaffar, Ghassan Beydoun, Jun Shen, William Tibben

Faculty of Informatics - Papers (Archive)

Context Analysis (CA) is typically used as an early phase preceding the development of a knowledge-based systems in order to indicate how the system should interact with its environment and the various stakeholders. We undertake a detailed context analysis of business processes of the Malaysian Games (MG)to highlight blind spots of the process and enable the identification of an initial sports event knowledge management (KM) framework. Firstly, our CommonKADS driven analysis highlights how we can improve the business process and enable the organization to develop, distribute and apply its knowledge resources effectively. Secondly, the paper highlights specific features about the …


Robust Resampling Confidence Intervals For Empirical Variograms, Robert Graham Clark, Samuel F. Allingham Jan 2011

Robust Resampling Confidence Intervals For Empirical Variograms, Robert Graham Clark, Samuel F. Allingham

Faculty of Informatics - Papers (Archive)

The variogram function is an important measure of the spatial dependenciesof a geostatistical or other spatial dataset. It plays a central role in kriging, designingspatial studies, and in understanding the spatial properties of geological andenvironmental phenomena. It is therefore important to understand the variability attachedto estimates of the variogram. Existing methods for constructing confidenceintervals around the empirical variogram either rely on strong assumptions, such asnormality or known variogram function, or are based on resampling blocks and subjectto edge effect biases. This paper proposes two new procedures for addressingthese concerns: a quasi-block-bootstrap and a quasi-block-jackknife. The new methodsare based on transforming …


Naturality Of Rieffel's Morita Equivalence For Proper Actions, Astrid An Huef, S Kaliszewski, Iain F. Raeburn, Dana P. Williams Jan 2011

Naturality Of Rieffel's Morita Equivalence For Proper Actions, Astrid An Huef, S Kaliszewski, Iain F. Raeburn, Dana P. Williams

Faculty of Informatics - Papers (Archive)

Suppose that a locally compact group G acts freely and properly on the right of a locally compact space T . Rieffel proved that if is an action of G on a C*-algebra A and there is an equivariant embedding of C0(T ) in M(A), then the action α of G on A is proper, and the crossed product Aα,rG is Morita equivalent to a generalised fixed-point algebra Fix(A,α ) in M(A)α. We show that the assignment (A,α) → Fix(A,α ) extends …


The Path Space Of A Higher-Rank Graph, Samuel B. Webster Jan 2011

The Path Space Of A Higher-Rank Graph, Samuel B. Webster

Faculty of Informatics - Papers (Archive)

We construct a locally compact Hausdorff topology on the path space of a finitely aligned k -graph Λ . We identify the boundary-path space ∂Λ as the spectrum of a commutative C ∗ -subalgebra D Λ of C ∗ (Λ) . Then, using a construction similar to that of Farthing, we construct a finitely aligned k -graph Λ ˜ with no sources in which Λ is embedded, and show that ∂Λ is homeomorphic to a subset of ∂Λ ˜ . We show that when Λ is row-finite, we can identify C ∗ (Λ) with a full corner of C ∗ …


The Business Service Representation Language: A Preliminary Report, Aditya K. Ghose, Evan D. Morrison, Lam-Son Le, Konstantin Hoesch-Klohe Jan 2011

The Business Service Representation Language: A Preliminary Report, Aditya K. Ghose, Evan D. Morrison, Lam-Son Le, Konstantin Hoesch-Klohe

Faculty of Informatics - Papers (Archive)

No abstract provided.


Does Technology Use Change When In A Developed Country? A Case Study Of Libyans In Australia, Fouad Elgahwash, Mark Freeman Jan 2011

Does Technology Use Change When In A Developed Country? A Case Study Of Libyans In Australia, Fouad Elgahwash, Mark Freeman

Faculty of Informatics - Papers (Archive)

With developing countries now gaining access to modern banking services for their customers, research is needed to understand how developing countries will adapt to these changes. Since the 1980s, in the Arabic region, technological expansion has occurred with a focus on trade and services offered by industries &¿ recently the banking sector has started to develop banking services through mobile devices and the Internet to improve customer relationships. In particular, the banking sector is an information intensive industry and aims to be at the forefront of advanced use of Information and Communication Technologies (ICTs). One common trend is increasing the …


3d Face Recognition Based On A Modified Icp Method, Kankan Zhao, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo Jan 2011

3d Face Recognition Based On A Modified Icp Method, Kankan Zhao, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

3D face recognition technique has gained much more attention recently, and it is widely used in security system, identification system, and access control system, etc. The core technique in 3D face recognition is to find out the corresponding points in different 3D face images. The classic partial Iterative Closest Point (ICP) method is iteratively align the two point sets based on repetitively calculate the closest points as the corresponding points in each iteration. After several iterations, the corresponding points can be obtained accurately. However, if two 3D face images with different scale are from the same person, the classic partial …


A Mathematical Model For The Biological Treatment Of Industrial Wastewaters In A Cascade Of Four Reactors, Annette L. Worthy, Mark I. Nelson, Rubayyi Turki Alqahtani Jan 2011

A Mathematical Model For The Biological Treatment Of Industrial Wastewaters In A Cascade Of Four Reactors, Annette L. Worthy, Mark I. Nelson, Rubayyi Turki Alqahtani

Faculty of Informatics - Papers (Archive)

Many industrial processes, particularly in the food industry, produce slurriesor wastewaters containing high concentrations of biodegradable organicmaterials. Before these contaminated wastewaters can be dischargedthe concentration of these pollutants must be reduced. A method which has beenextensively employed to remove biodegradable organic matter is biologicaltreatment. In this process the wastewater (or slurry) is passed through abioreactor containing biomass which grows through consumption of thepollutants.The industrial treatment of wastewaters typically employs a reactor cascade.In a reactor cascade of n reactors the effluent stream from the ith reactor inthe cascade acts as the feed stream for the (i+1)th reactor, i.e. the nextreactor. The …


Application Of Microsimulation To Disease Transmission And Control, A Green, Y Zhang, I Piper, Daniel Keep Jan 2011

Application Of Microsimulation To Disease Transmission And Control, A Green, Y Zhang, I Piper, Daniel Keep

Faculty of Informatics - Papers (Archive)

In this paper, we present an extension of our novel microsimulation technique, as applied to biological infection spread, to estimate the underlying causal parameters driving an infectious process. The underlying simulation framework, Simulacron, was developed in order to understand the development and course of, response to and recovery from single and multiple threats on community populations. Such threats include a range of natural (such as disease spread in communities, fire, flood etc.) and manmade events (such as terrorism, including the use of biological agents, money laundering, smuggling as well as accidents etc.). These threats can cause serious disruption to modern …


Propagation Of Optical Spatial Solitary Waves In Bias-Free Nematic-Liquid-Crystal Cells, Antonmaria A. Minzoni, Luke W. Sciberras, Noel F. Smyth, Annette L. Worthy Jan 2011

Propagation Of Optical Spatial Solitary Waves In Bias-Free Nematic-Liquid-Crystal Cells, Antonmaria A. Minzoni, Luke W. Sciberras, Noel F. Smyth, Annette L. Worthy

Faculty of Informatics - Papers (Archive)

The propagation of a bulk optical solitary wave in a rectangular cell filled with a nematic liquid crystal—a nematicon—is mathematically modelled. In order to overcome the Freédricksz threshold the cell walls are rubbed to pretilt the nematic. A modulation theory, based on a Lagrangian formulation, is developed for the (2+1)-dimensional propagation of the solitary wave beam down the cell. This modulation theory is based on two different formulations of the director distribution. The relative advantages and disadvantages of these two methods are discussed. A previously unexplored method based on images is found to possess significant advantages. Excellent agreement with full …


Using A Multi-Experimental Approach To Assess The Fate Of Angled-And-Released Yellowtail Kingfish (Seriola Lalandi), Lachlan W. Roberts, Paul A. Butcher, Matt K. Broadhurst, Brian R. Cullis Jan 2011

Using A Multi-Experimental Approach To Assess The Fate Of Angled-And-Released Yellowtail Kingfish (Seriola Lalandi), Lachlan W. Roberts, Paul A. Butcher, Matt K. Broadhurst, Brian R. Cullis

Faculty of Informatics - Papers (Archive)

Yellowtail kingfish (Seriola lalandi) are angled throughout their global distribution and released in large numbers under the unsubstantiatedassumption of few impacts. The validity of this supposition was tested for southeastern Australian stocks. In all, 54 fishwere angled and released into cages with 36 controls and monitored for 5 d. Of the angled fish, 15% died, mostly as a consequenceof gill-hooking and the associated physiological and mechanical damage. A biotelemetry experiment was then performed to determineif cutting the line on gill-hooked fish could improve their post-release fate. The attachment of transmitters was validated in anaquarium experiment before 12 jaw- and 10 …


Optimization Of Task Processing Schedules In Distributed Information Systems, Janusz R. Getta Jan 2011

Optimization Of Task Processing Schedules In Distributed Information Systems, Janusz R. Getta

Faculty of Informatics - Papers (Archive)

The performance of data processing in distributed information systems strongly depends on theefficient scheduling of the applications that access data at the remote sites. This work assumes atypical model of distributed information system where a central site is connected to a number ofremote and highly autonomous remote sites. An application started by a user at a central site isdecomposed into several data processing tasks to be independently processed at the remote sites.The objective of this work is to find a method for optimization of task processing schedules at acentral site. We define an abstract model of data and a system …


Exploring Teleconsultation Acceptance: A Comparison Study Between Emergency And Non-Emergency Setting, Nurazean Maarop, Khin Than Win, Maslin Masrom, Sukdershan Singh Hazara Singh Jan 2011

Exploring Teleconsultation Acceptance: A Comparison Study Between Emergency And Non-Emergency Setting, Nurazean Maarop, Khin Than Win, Maslin Masrom, Sukdershan Singh Hazara Singh

Faculty of Informatics - Papers (Archive)

This research explores the acceptance of teleconsultation technology among healthcare providers of public hospitals in Malaysia. Primary constructs from Davis' Technology Acceptance Model (TAM) are employed for this purpose. Further, the study also compares the level of user acceptance between emergency and non-emergency setting. This study is based on descriptive statistic and correlation analysis served as preliminary exploration of the acceptance of the technology understudy. The study reports a high level of acceptance of teleconsultation technology in both emergency and non-emergency settings thus exhibits no significant difference in acceptance the acceptance of teleconsultation technology for both respective settings. The results …


Initial Values In Estimation Procedures For State Space Models (Ssms), Raed Alzghool, Yan-Xia Lin Jan 2011

Initial Values In Estimation Procedures For State Space Models (Ssms), Raed Alzghool, Yan-Xia Lin

Faculty of Informatics - Papers (Archive)

In this paper, we will focus on State Space Models(SSMs), especially the stochastic volatility model, and lookfor a standard approach for assigning initial values in theQuasi-Likelihood (QL) and Asymptotic Quasi-Likelhood (AQL)estimation procedures.


A Spectral-Collocation Method For Pricing Perpetual American Puts With Stochastic Volatility, Song-Ping Zhu, Wenting Chen Jan 2011

A Spectral-Collocation Method For Pricing Perpetual American Puts With Stochastic Volatility, Song-Ping Zhu, Wenting Chen

Faculty of Informatics - Papers (Archive)

Based on the Legendre pseudospectral method, we propose a numerical treatment for pricing perpetual American put option with stochastic volatility. In this simple approach, a nonlinear algebraic equation system is first derived, and then solved by the Gauss–Newton algorithm. The convergence of the current scheme is ensured by constructing a test example similar to the original problem, and comparing the numerical option prices with those produced by the classical Projected SOR (PSOR) method. The results of our numerical experiments suggest that the proposed scheme is both accurate and efficient, since the spectral accuracy can be easily achieved within a small …


Threshold Anonymous Announcement In Vanets, Guilin Wang, L Chen, S. L. Ng Jan 2011

Threshold Anonymous Announcement In Vanets, Guilin Wang, L Chen, S. L. Ng

Faculty of Informatics - Papers (Archive)

Vehicular ad hoc networks (VANETs) allow wireless communications between vehicles without the aid of a central server. Reliable exchanges of information about road and traffic conditions allow a safer and more comfortable travelling environment. However, such profusion of information may allow unscrupulous parties to violate user privacy. On the other hand, a degree of auditability is desired for law enforcement and maintenance purposes. In this paper we propose a Threshold Anonymous Announcement service using direct anonymous attestation and one-time anonymous authentication to simultaneously achieve the seemingly contradictory goals of reliability, privacy and auditability.