Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 1141 - 1170 of 2013

Full-Text Articles in Physical Sciences and Mathematics

Stc-Mimo Block Spread Ofdm In Frequency Selective Rayleigh Fading Channels, Le Chung Tran, Xiaojing Huang, Eryk Dutkiewicz, Joe F. Chicharo Jan 2006

Stc-Mimo Block Spread Ofdm In Frequency Selective Rayleigh Fading Channels, Le Chung Tran, Xiaojing Huang, Eryk Dutkiewicz, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

In this paper, we expand the idea of spreading the transmitted symbols in OFDM systems by unitary spreading matrices based on the rotated Hadamard or rotated Discrete Fourier Transform (DFT) matrices proposed in the literature to apply to Space-Time Coded Multiple-Input Multiple-Output OFDM (STC-MIMO-OFDM) systems. We refer the resulting systems to as STC-MIMO Block Spread OFDM (STC-MIMO-BOFDM) systems. In the proposed systems, a multi-dimensional diversity, including time, frequency, space and modulation diversities, can be used, resulting in better bit error performance in frequency selective Rayleigh fading channels compared to the conventional OFDM systems with or without STCs. Simulations carried out …


Modelling The Induced Force Of Attraction In Electrorheological Nanofluids, Barry J. Cox, Ngamta Thamwattana, James M. Hill Jan 2006

Modelling The Induced Force Of Attraction In Electrorheological Nanofluids, Barry J. Cox, Ngamta Thamwattana, James M. Hill

Faculty of Informatics - Papers (Archive)

The problem of electric-field induced force between spheres is fundamental to electrorheological fluids. In this paper we summarize recent work, and in particular present an exact solution to the electrostatic problem of dielectric spheres subject to an externally applied electric field. The numerical results are compared to published experimental data and the solution is shown to accurately predict the low-frequency experimental results at all measured interstices and particularly is applicable to nanosized spheres in close proximity. This method is applicable to nonidentical spheres and results indicate a genuine maximum in the attractive force between spheres exists, which depends on relative …


Freight Transport Cost Recovery In Australia, Philip Laird Jan 2006

Freight Transport Cost Recovery In Australia, Philip Laird

Faculty of Informatics - Papers (Archive)

Introduction: Recent rail and road freight tasks in Australia are indicated in Table 1. The income from rail freight services in 2002-03 was noted by the Australasian Railway Association (ARA - 2004) as $3 billion (hire and reward earnings plus the market value of ancillary freight operations). The hire and reward road freight industry income for 1999-2000 was about $18.2 billion (Australian Trucking Association, 2004).


A Coordinated Architecture For The Agent-Based Service Level Agreement Negotiation Of Web Service Composition, Mohan Baruwal Chhetri, Jian Lin, Sukkeong Goh, Jun Yan, Jian Ying Zhang, Ryszard Kowalczyk Jan 2006

A Coordinated Architecture For The Agent-Based Service Level Agreement Negotiation Of Web Service Composition, Mohan Baruwal Chhetri, Jian Lin, Sukkeong Goh, Jun Yan, Jian Ying Zhang, Ryszard Kowalczyk

Faculty of Informatics - Papers (Archive)

Recent progress in the field of Web services has made it possible to integrate inter-organizational and heterogeneous services on the Web at runtime. If a user request cannot be satisfied by a single Web service, it is (or should be) possible to combine existing services in order to fulfill the request. However, there are several challenging issues that need to be addressed before this can be realized in the true sense. One of them is the ability to ensure end-to-end QoS of a Web service composition. There is a need for a SLA negotiation system which can ensure the autonomous …


Using Spatial Audio Cues From Speech Excitation For Meeting Speech Segmentation, Eva Cheng, I. Burnett, Christian Ritz Jan 2006

Using Spatial Audio Cues From Speech Excitation For Meeting Speech Segmentation, Eva Cheng, I. Burnett, Christian Ritz

Faculty of Informatics - Papers (Archive)

Multiparty meetings generally involve stationary participants. Participant location information can thus be used to segment the recorded meeting speech into each speaker's 'turn' for meeting 'browsing'. To represent speaker location information from speech, previous research showed that the most reliable time delay estimates are extracted from the Hubert envelope of the linear prediction residual signal. The authors' past work has proposed the use of spatial audio cues to represent speaker location information. This paper proposes extracting spatial audio cues from the Hubert envelope of the speech residual for indicating changing speaker location for meeting speech segmentation. Experiments conducted on recordings …


Inpcm: A Network Caching Technique For Improving The Performance Of Tcp In Wireless Ad-Hoc Networks, Andrew Adinegara, W. H. O. Lau, Kwan-Wu Chin Jan 2006

Inpcm: A Network Caching Technique For Improving The Performance Of Tcp In Wireless Ad-Hoc Networks, Andrew Adinegara, W. H. O. Lau, Kwan-Wu Chin

Faculty of Informatics - Papers (Archive)

We propose a novel mechanism called In-Network Packet Caching Mechanism (inPCM) to address TCP's poor performance in IEEE 802.11 based multi-hop wireless networks. In particular, we address TCP's inappropriate response to bursty and location dependent errors. The key concept is the use of intermediate nodes to perform packet recovery on behalf of TCP senders, similar to the well-known Snoop TCP but adapted to work over multi-hop wireless networks. We have conducted ns-2 simulation studies over a variety of network conditions and topologies. Our results confirm InPCM's benefits to TCP in terms of delay and throughput. Moreover, it is immediately deployable …


Hadamard Matrices Constructed By Circulant And Negacyclic Matrices, Tianbing Xia, Mingyuan Xia, Jennifer Seberry, Jing Wu Jan 2006

Hadamard Matrices Constructed By Circulant And Negacyclic Matrices, Tianbing Xia, Mingyuan Xia, Jennifer Seberry, Jing Wu

Faculty of Informatics - Papers (Archive)

In this paper we establish a correspondence between circulant and negacyclic matrices of order n for n odd, give the definition of suitable matrices, and show several new methods for constructing compsite suitable negacyclic (circulant) matrices from base sequences and suitable negacyclic (circulant) matrices under some general conditions.


An Energy Efficient Mac-Phy Approach To Support Distributed Source Coding In Wireless Sensor Network, Wei Wang, Dongming Peng, Honggang Wang, Hamid Sharif, Tadeusz A. Wysocki, Beata J. Wysocki Jan 2006

An Energy Efficient Mac-Phy Approach To Support Distributed Source Coding In Wireless Sensor Network, Wei Wang, Dongming Peng, Honggang Wang, Hamid Sharif, Tadeusz A. Wysocki, Beata J. Wysocki

Faculty of Informatics - Papers (Archive)

Distributed Source Coding (DSC) based signal processing applications are ideal candidates for multirate transmissions in Wireless Sensor Network (WSN). In this paper, we propose a novel MAC-PHY approach in WSN to achieve energy efficiency using multirate desirable for the DSC based signal processing applications. Our approach is different from the common multirate research in link adaptation, the focus of which is to increase throughput based on rate adaptation derived from variable channel conditions. In the proposed approach, the redundant and inefficient communications are eliminated, yielding significant improvement of energy efficiency in WSN. Here, the minimum desirable transmission power can be …


Correlating Business Process And Organizational Models To Manage Change, George Koliadis, Aditya K. Ghose, Moshiur Bhuiyan Jan 2006

Correlating Business Process And Organizational Models To Manage Change, George Koliadis, Aditya K. Ghose, Moshiur Bhuiyan

Faculty of Informatics - Papers (Archive)

Business Process Management (BPM) provides the methods, tools and modelling notations to support a processcentric organizational view and management capability. As organizations grow in size and complexity, process improvement initiatives may involve change that has direct / significant impact across an organization. Thus, we provide methods and extensions to existing process modelling notations to analyse change against high- level models of the organization. Our approach permits improved analysis against higher-level organizational structures, motivations, inter-dependencies and capabilities that should be ideally considered as primary requirements during process design. Additionally, the organizational model becomes the ‘scaffolding’ with which to construct effective process …


Fairness And Playability In Online Multiplayer Games, Jeremy Brun, Farzad Safaei, Paul Boustead Jan 2006

Fairness And Playability In Online Multiplayer Games, Jeremy Brun, Farzad Safaei, Paul Boustead

Faculty of Informatics - Papers (Archive)

Playability and fairness are crucial elements of an enjoyable online game experience. The unavoidable propagation time introduced by the geographical distance between participants can deteriorate the game responsiveness and playability. Also, differences in these delays can provide unfair advantages and/or disadvantages to different players. This paper explores the causal relationships between propagation time, inconsistencies, playability and fairness in online multiplayer games. It clearly defines causes of unfairness and introduces a theoretical quantification supported by an experimental technique to evaluate it in simulations. It also demonstrates through simulations the impact of changes in network architecture and topology on playability and fairness.


A New Analytical-Approximation Formula For The Optimal Exercise Boundary Of American Put Options, Song-Ping Zhu Jan 2006

A New Analytical-Approximation Formula For The Optimal Exercise Boundary Of American Put Options, Song-Ping Zhu

Faculty of Informatics - Papers (Archive)

In this paper, a new analytical formula as an approximation to the value of American put options and their optimal exercise boundary is presented. A transform is first introduced to better deal with the terminal condition and, most importantly, the optimal exercise price which is an unknown moving boundary and the key reason that valuing American options is much harder than valuing its European counter- parts. The pseudo-steady-state approximation is then used in the performance of the Laplace transform, to convert the systems of partial differential equations to sys- tems of ordinary differential equations in the Laplace space. A simple …


Solution Of A Certain Class Of Network Flow Problems With Cascaded Demand Aggregation And Capacity Allocation, Farzad Safaei, I. Ouveysi Jan 2006

Solution Of A Certain Class Of Network Flow Problems With Cascaded Demand Aggregation And Capacity Allocation, Farzad Safaei, I. Ouveysi

Faculty of Informatics - Papers (Archive)

This article develops analytical models for a class of networking problems that includes two cascaded stages of demand aggregation and capacity allocation. The solutions to these problems are required in real time as the demand fluctuates rapidly. The capacity allocation problem makes a large-scale integer programming problem too complex for practical applications. Using the Lagrangian relaxation technique and a suitably developed heuristic for multiplier adjustment, the computational complexity is reduced to such a degree that a real-time implementation of the algorithm is feasible. This article also develops efficient heuristics to aggregate demand. The proposed algorithm produces a near-optimal solution in …


A Combined Approach For Supporting The Business Process Model Lifecycle, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, Aditya K. Ghose Jan 2006

A Combined Approach For Supporting The Business Process Model Lifecycle, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

Business processes evolve throughout their lifecycle of change. Business Process Modeling (BPM2) notations such as BPMN are used to effectively conceptualize and communicate important process characteristics to relevant stakeholders. Agent-oriented conceptual modeling notations, such as i*, effectively capture and communicate organizational context. In this paper we argue that the management of change throughout the business process model lifecycle can be more effectively supported by combining notations. In particular, we identify two potential sources of process change, one occurring within the organizational context and the other within the operational context. As such the focus in this paper is on the co-evolution …


The Influence Of Site Physical Characteristics On Power Quality Performance, Glenn Nicholson, Victor J. Gosbell, Ashok Parsotam Jan 2006

The Influence Of Site Physical Characteristics On Power Quality Performance, Glenn Nicholson, Victor J. Gosbell, Ashok Parsotam

Faculty of Informatics - Papers (Archive)

Routine power quality (PQ) monitoring is limited to a statistical sample of sites that are hopefully representative of the overall PQ performance of the network. It would be helpful if the PQ performance of un-monitored sites could be inferred from the results of a PQ survey from a site having similar physical characteristics. This is only possible if it is known which physical characteristics are most influential in determining PQ performance. This paper describes the application of factor analysis techniques to determine the relationship between known site physical characteristics and PQ disturbance levels on the Vector Distribution Network (Auckland, New …


Challenges And Opportunities Facing Australian Universities Caused By Internationalisation Of Chinese Higher Education, Mingxuan Wu, Ping Yu Jan 2006

Challenges And Opportunities Facing Australian Universities Caused By Internationalisation Of Chinese Higher Education, Mingxuan Wu, Ping Yu

Faculty of Informatics - Papers (Archive)

China opened its market to the world after it entered The World Trade Organisation (WTO) at the turn of the last century. The Chinese Ministry of Education recently reviewed a series of policies about international cooperation in higher education with foreign countries in an effort to standardise their practice through centralised control. The purpose of this paper is to analyse current features and trends in international cooperation in Chinese higher education. This paper also develops a benefit-driven model of the internationalisation of Chinese higher education, and attempts to address the reasons for the marketability of cooperative programs in China. Finally, …


Modelling A Wool Scour Bowl, James Caunce, Geoff Mercer, S. I. Barry, Timothy R. Marchant Jan 2006

Modelling A Wool Scour Bowl, James Caunce, Geoff Mercer, S. I. Barry, Timothy R. Marchant

Faculty of Informatics - Papers (Archive)

Wool scouring is the process of washing dirty wool after shearing. Our model simulates, using the advection-diffusion equation, the movement of contaminants within a scour bowl. The effects of varying the important parameters are investigated. Interesting, but simple, relationships are found which give insight into the dynamics of a scour bowl.


Simple Implementations Of Mutually Orthogonal Complementary Sets Of Sequences, Xiaojing Huang Dec 2005

Simple Implementations Of Mutually Orthogonal Complementary Sets Of Sequences, Xiaojing Huang

Faculty of Informatics - Papers (Archive)

This paper presents simple software and hardware implementations for a class of mutually orthogonal complementary sets of sequences based on its closed-form construction formula. Following a brief review of the Golay-paired Hadamard matrix concept, the flow graph for constructing mutually orthogonal Golay-paired Hadamard matrices, which represent the scalable complete complementary sets of sequences, is proposed. Then, their superb scalability and completeness are summarized. Finally, the C and Matlab functions and a logic schematic diagram are given to easily generate these complementary sequences.


A Fast Neural-Based Eye Detection System, Fok Hing Chi Tivive, Abdesselam Bouzerdoum Dec 2005

A Fast Neural-Based Eye Detection System, Fok Hing Chi Tivive, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

This paper presents a fast eye detection system which is based on an artificial neural network known as the shunting inhibitory convolutional neural network, or SICoNNet for short. With its two-dimensional network architecture and the use of convolution operators, the eye detection system processes an entire input image and generates the location map of the detected eyes at the output. The network consists of 479 trainable parameters which are adapted by a modified Levenberg-Marquardt training algorithm in conjunction with a bootstrap procedure. Tested on 180 real images, with 186 faces, the accuracy of the eye detector reaches 96.8% with only …


Fringe Pattern Profilometry Based On Inverse Function Analysis, Y. Hu, Jiangtao Xi, Enbang Li, Joe F. Chicharo, Zongkai Yang Dec 2005

Fringe Pattern Profilometry Based On Inverse Function Analysis, Y. Hu, Jiangtao Xi, Enbang Li, Joe F. Chicharo, Zongkai Yang

Faculty of Informatics - Papers (Archive)

In this paper, we proposed a new algorithm, referred to as inverse function analysis (IFA) method based on the derived mathematical model to reconstruct 3-D surfaces using fringe pattern profilometry (FPP) technique. Compared with traditional methods, our algorithm has neither the requirement for the structure of projected fringe patterns, nor the prior knowledge of the characteristics of projection systems. The correctness of inverse function analysis (IFA) method has been confirmed by simulation results. It can be seen that the measurement accuracy has been significantly improved by inverse function analysis (IFA) method, especially when the expected sinusoidal fringe patterns are distorted …


A Vision System For Providing The Blind With 3d Colour Perception Of The Environment, S. Meers, Koren Ward Dec 2005

A Vision System For Providing The Blind With 3d Colour Perception Of The Environment, S. Meers, Koren Ward

Faculty of Informatics - Papers (Archive)

Although various attempts have been made at providing the blind with substitute visual perception, no existing method provides useful colour perception of the environment. This paper describes a substitute vision system which provides perception of the three-dimensional profile and colour of the surrounding environment via haptic sensations alone. This is aimed at allowing visually-impaired people to avoid obstacles and navigate the environment by recognising landmarks by their colour and profile. The prototype system uses stereo video cameras to capture colour images of the environment from which a disparity depth map can be calculated. The depth map is sampled into ten …


High-Capacity Steganography Using A Shared Colour Palette, G. Brisbane, R. Safavi-Naini, P. Ogunbona Dec 2005

High-Capacity Steganography Using A Shared Colour Palette, G. Brisbane, R. Safavi-Naini, P. Ogunbona

Faculty of Informatics - Papers (Archive)

Seppanen, Makela and Keskinarkaus (SMK) have proposed a high-capacity steganographic technique to conceal information within a colour image. The technique is significant because of the high volume of data that is embedded into pixels but it results in a high level of noise and so the quality of the resulting image is not acceptable. A new type of coding structure is proposed, which maintains a high capacity but lowers the level of noise. Secondly, an adaptive algorithm is used to identify pixel values that have a high capacity to distortion ratio. Also the maximum size of the coding structures is …


Access Policy Sheet For Access Control In Fine-Grained Xml, Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan Dec 2005

Access Policy Sheet For Access Control In Fine-Grained Xml, Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan

Faculty of Informatics - Papers (Archive)

We propose an access control scheme for developing authorization rules for XML documents, allowing flexible data granularity and authorization propagation. To simplify the complex access control policies in XML, we introduce a new tool: Authorization Policy Sheet (APS). Complex access control rules can be easily described in an APS. The administrator of a system can easily manage the access control of the system. With aid of Data Type Definitions(DTD), the policies given in an APS can be converted into a standard XML code that can be implemented in a normal XML environment.


Service Discovery In Wireless Ad-Hoc Control Networks, Shengrong Bu, F. Naghdy Dec 2005

Service Discovery In Wireless Ad-Hoc Control Networks, Shengrong Bu, F. Naghdy

Faculty of Informatics - Papers (Archive)

A new concept in distributed control systems called Wireless Ad-hoc Control Networks (WACNets) is developed. WACNets is formed by a collection of nodes with the ability to sense, actuate and control. The network does not have a fixed structure, but evolves and self organises itself according to the control requirements of the system. The service discovery developed for WACNets is reported. A review of the existing Service Discovery Protocol (SDPs) including Jini, Salutation, Universal Plug and Play (UPnP), and Bluetooth technology is carried out. An overview of WACNets is provided. The service discovery protocol developed for WACNets is introduced and …


A Digital Pixel Sensor Array With Programmable Dynamic Range, A. Kitchen, A. Bermak, Abdesselam Bouzerdoum Dec 2005

A Digital Pixel Sensor Array With Programmable Dynamic Range, A. Kitchen, A. Bermak, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

This paper presents a digital pixel sensor (DPS) array employing a time domain analogue-to-digital conversion (ADC) technique featuring adaptive dynamic range and programmable pixel response. The digital pixel comprises a photodiode, a voltage comparator, and an 8-bit static memory. The conversion characteristics of the ADC are determined by an array-based digital control circuit, which linearizes the pixel response, and sets the conversion range. The ADC response is adapted to different lighting conditions by setting a single clock frequency. Dynamic range compression was also experimentally demonstrated. This clearly shows the potential of the proposed technique in overcoming the limited dynamic range …


Some New Results Of Regular Hadamard Matrices And Sbibd Ii, Tianbing Xia, M. Xia, Jennifer Seberry Dec 2005

Some New Results Of Regular Hadamard Matrices And Sbibd Ii, Tianbing Xia, M. Xia, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

In this paper we prove that there exist 4—{k2; 1/2k(k—1); k(k—2)} SDS, regular Hadamard matrices of order 4k2, and SBIBD(4k2, 2k2 + k, k2 + k) for k = 47, 71, 151, 167, 199, 263, 359, 439, 599, 631, 727, 919, 5q1, 5q2N, 7q3, where ql, q2 and q3 are prime power such that ql ≡ 1(mod 4), q2 ≡ 5(mod 8) and q3 ≡ 3(mod 8), N = 2a3bt2, a, b = 0 or 1, t ≠ 0 is an arbitrary integer. We find new SBIBD(4k2, 2k2 + k, k2 + k) for 43 values of k less than …


Bittorrent In A Dynamic Resource Adapting Peer-To-Peer Network, L. Rong, I. Burnett Nov 2005

Bittorrent In A Dynamic Resource Adapting Peer-To-Peer Network, L. Rong, I. Burnett

Faculty of Informatics - Papers (Archive)

Our previous work proposed a MPEG-21 based P2P network architecture supporting resource adaptation on the basis of usage environment and user preferences. In this paper, we investigate the deployment of a BitTorrent (BT) - like approach in the previous super-peer P2P resource adaptation architecture. In addition, the architecture's peer selection strategy is adopted and evaluated as a way to enhance the peer selection process in BT. The strategy uses super peers as trackers to intelligently select peers according to their capabilities and shared resource segments. Simulation results show that the proposed selection strategy reduces average access time and increases download …


Application Of Competitive Clustering To Acquisition Of Human Manipulation Skills, S. Dong, F. Naghdy Nov 2005

Application Of Competitive Clustering To Acquisition Of Human Manipulation Skills, S. Dong, F. Naghdy

Faculty of Informatics - Papers (Archive)

The work carried out to explore the feasibility of reconstructing human constrained motion manipulation skills is reported. This is achieved by tracing and learning the manipulation performed by a human operator in a haptic rendered virtual environment. The peg-in-hole insertion problem is used as a case study. In the developed system, position and contact force and torque as well as orientation data generated in the haptic rendered virtual environment combined with a priori knowledge about the task are used to identify and learn the skills in the newly demonstrated task. The data obtained from the virtual environment is classified into …


Adaptive Modeling Of Vehicle Mirror Vibrations By Predictive Compensation, Antoine Larchez, Fazel Naghdy Nov 2005

Adaptive Modeling Of Vehicle Mirror Vibrations By Predictive Compensation, Antoine Larchez, Fazel Naghdy

Faculty of Informatics - Papers (Archive)

The external and internal mirrors used particularly in high mass recreational and commercial vehicles are prone to vibrations. Under certain conditions, this leads to blurring of the reflected images above the tolerable levels for the human vision. While such vibrations are quite disturbing, they can compromise the driver’s safety on the road. An adaptive predictive system is designed to compensate for the mirror vibrations under different driving conditions. The realtime adaptive modeling of the vibrations using ARMA for the purpose of their prediction is reported.


Human Motion Recognition Through Fuzzy Hidden Markov Model, X. Zhang, F. Naghdy Nov 2005

Human Motion Recognition Through Fuzzy Hidden Markov Model, X. Zhang, F. Naghdy

Faculty of Informatics - Papers (Archive)

A new type of Hidden Markov Model (HMM) developed based on the fuzzy clustering result is proposed for identification of human motion. By associating the human continuous movements with a series of human motion primitives, the complex human motion could be analysed as the same process as recognizing a word by alphabet. However, because the human movements can be multi-paths and inherently stochastic, it is indisputable that a more sophisticated framework must be applied to reveal the statistic relationships among the different human motion primitives. Hence, based on the human motion recognition results derived from the fuzzy clustering function, HMM …


Constructing University Timetable Using Constraint Satisfaction Programming Approach, L. Zhang, Sim Kim Lau Nov 2005

Constructing University Timetable Using Constraint Satisfaction Programming Approach, L. Zhang, Sim Kim Lau

Faculty of Informatics - Papers (Archive)

The timetabling problem consists of a set of subjects to be scheduled in different timeslots, a set of rooms in which the subjects can take place, a set of students who attend the subjects, and a set of subjects satisfied by rooms and required by timeslots. The heart of the problem is the constraints that exist as regulations within each resource and between resources. There are various solution approaches to solve the timetabling problem. This paper focuses on developing a constraint satisfaction problem model for a university timetabling problem. A solution of a constraint satisfaction problem is a consistent assignment …