Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 1321 - 1350 of 2013

Full-Text Articles in Physical Sciences and Mathematics

Mangoes And Chilli Peppers: A Domain Study Of Online Trust In Eauctions, Glenn R. Bewsell Jan 2005

Mangoes And Chilli Peppers: A Domain Study Of Online Trust In Eauctions, Glenn R. Bewsell

Faculty of Informatics - Papers (Archive)

Auctions are one of the most successful types of e-commerce. The price of this success is the incidence of online fraud and an increasing number of disputes between buyers and sellers. A better understanding of online trust is required. A qualitative study is discussed within this paper to identify factors that increase online trust at an online auction.

A result of this discussion I seek to answer the question: what mechanisms do people perceive as important to increase online trust prior to an online transaction? A better understanding of online trust adds to the body of theory and can be …


Distributing Network Game Servers For Improved Geographical Scalability, Paul A. Boustead, Farzad Safaei, Jeremy Brun Jan 2005

Distributing Network Game Servers For Improved Geographical Scalability, Paul A. Boustead, Farzad Safaei, Jeremy Brun

Faculty of Informatics - Papers (Archive)

World-wide multiplayer games present several scalability challenges for large-scale deployment. In recent years, significant research has been devoted to scaling in terms of number of players so that the same virtual world can accommodate larger number of simultaneous avatars. A possible solution is to use grid computing techniques for distribution of processing over a cluster or a distributed set of servers. Scalability with respect to geographical distribution of players is another challenge. Large geographical distances between players introduces propagation delays which are impossible to avoid. Without proper design, responsiveness of the application to user inputs is degraded even when there …


A Theoretical Justification For Partnerships In Community Technology Centre Projects, William Tibben Jan 2005

A Theoretical Justification For Partnerships In Community Technology Centre Projects, William Tibben

Faculty of Informatics - Papers (Archive)

In many Community Technology Centre projects, partnerships are emerging as a fundamentally important aspect to achieving sustainability. While generally considered a less formal approach than direct funding from rich benefactors such as Government or philanthropic organisations, the paper argues that partnerships offer an effective and theoretically justifiable framework to achieving sustainability. Drawing on information based perspectives the paper proposes a theoretical justification for the use of partnerships in community informatics projects that is able to incorporate individuals and groups in the analysis.


A Generalised Minimum Variance Controller For Time-Varying Systems, Zheng Li, Christian Schmid Jan 2005

A Generalised Minimum Variance Controller For Time-Varying Systems, Zheng Li, Christian Schmid

Faculty of Informatics - Papers (Archive)

In this paper, the problem of generalised minimum variance control of linear time-varying systems is studied. A time-varying optimal controller is developed for a standard controlled autoregressive moving average model using a cost function that is the sum of the plant output tracking error variance plus a penalty term of the squared manipulated variable.


An Efficient Certified E-Mail Scheme Suitable For Wireless Mobile Environments, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng Jan 2005

An Efficient Certified E-Mail Scheme Suitable For Wireless Mobile Environments, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng

Faculty of Informatics - Papers (Archive)

As security enhanced systems for standard e-mail, certified e-mail schemes guarantee the fair exchange of a digital message with the corresponding receipt between two mistrusted parties. That is, the intended receiver gets the e-mail content if and only if the e-mail sender obtains an irrefutable receipt issued by the receiver, which could be used to prove that the message has been delivered to the receiver. A number of such protocols have been proposed in recent years. However, most of them are not suitable for mobile networks, since many intricate cryptographic primitives are involved so that considerable overheads are introduced. In …


Large Object Segmentation With Region Priority Rendering, Yang-Wai Chow, Ronald Pose, Matthew Regan Jan 2005

Large Object Segmentation With Region Priority Rendering, Yang-Wai Chow, Ronald Pose, Matthew Regan

Faculty of Informatics - Papers (Archive)

The Address Recalculation Pipeline is a hardware architecture designed to reduce the end-to-end latency suffered by immersive Head Mounted Display virtual reality systems. A demand driven rendering technique known as priority rendering was devised for use in conjunction with the address recalculation pipeline. Using this technique, different sections of a scene can be updated at different rates, resulting in reductions to the rendering load.Further reductions can potentially be achieved by allowing for the segmenting of large objects. However in doing so a tearing problem surfaces, which has to be overcome before large object segmentation can be used effectively in priority …


The Analysis Of Crop Cultivar Breeding And Evaluation Trials: An Overview Of Current Mixed Model Approaches, A B. Smith, Brian R. Cullis, R Thompson Jan 2005

The Analysis Of Crop Cultivar Breeding And Evaluation Trials: An Overview Of Current Mixed Model Approaches, A B. Smith, Brian R. Cullis, R Thompson

Faculty of Informatics - Papers (Archive)

The analysis of series of crop variety trials has a long history with the earliest approaches being based on ANOVA methods. Kempton (1984) discussed the inadequacies of this approach, summarized the alternatives available at that time and noted that all of these approaches could be classified as multiplicative models. Recently, mixed model approaches have become popular for the analysis of series of variety trials. There are numerous reasons for their use, including the ease with which incomplete data (not all varieties in all trials) can be handled and the ability to appropriately model within-trial error variation. Currently, the most common …


Study Of Characteristics Of Effective Online Help Systems To Facilitate Nurses Interacting With Nursing Information Systems, Yiyu Qiu, Ping Yu Jan 2005

Study Of Characteristics Of Effective Online Help Systems To Facilitate Nurses Interacting With Nursing Information Systems, Yiyu Qiu, Ping Yu

Faculty of Informatics - Papers (Archive)

Topic area and paper objectives: Through identifying characteristics of Online Help System (OHS) that could facilitate nurses effectively interacting with information system, this paper proposes a framework that could guide the development of OHS written for a Nursing Information System (NIS). Background and concise literature review: User training is an important mechanism to guarantee the success of information system implementation. This is particularly true for a user group such as nurses. When faced with unfamiliar tasks, a user requires assistance to get the system to work. An OHS is supposed to be helpful in such situation. However, to date it …


Dice: Internet Delivery Of Immersive Voice Communication For Crowded Virtual Spaces, P. Boustead, Farzad Safaei, M. Dowlatshahi Jan 2005

Dice: Internet Delivery Of Immersive Voice Communication For Crowded Virtual Spaces, P. Boustead, Farzad Safaei, M. Dowlatshahi

Faculty of Informatics - Papers (Archive)

This paper develops a scalable system design for the creation, and delivery over the Internet, of a realistic voice communication service for crowded virtual spaces. Examples of crowded spaces include virtual market places or battlefields in online games. A realistic crowded audio scene including spatial rendering of the voices of surrounding avatars is impractical to deliver over the Internet in a peer-to-peer manner due to access bandwidth limitations and cost. A brute force server model, on the other hand, will face significant computational costs and scalability issues. This paper presents a novel server-based architecture for this service that performs simple …


Sketch-Based Image Matching Using Angular Partitioning, A. Chalechale, G. Naghdy, Alfred Mertins Jan 2005

Sketch-Based Image Matching Using Angular Partitioning, A. Chalechale, G. Naghdy, Alfred Mertins

Faculty of Informatics - Papers (Archive)

This work presents a novel method for image similarity measure, where a hand-drawn rough black and white sketch is compared with an existing data base of full color images (art works and photographs). The proposed system creates ambient intelligence in terms of the evaluation of nonprecise, easy to input sketched information. The system can then provide the user with options of either retrieving similar images in the database or ranking the quality of the sketch against a given standard, i.e., the original image model. Alternatively, the inherent pattern-matching capability of the system can be utilized to allow detection of distortion …


Latency-Driven Distribution: Infrastructure Needs Of Participatory Entertainment Applications, Farzad Safaei, P. Boustead, C. D. Nguyen, J. Brun, M. Dowlatshahi Jan 2005

Latency-Driven Distribution: Infrastructure Needs Of Participatory Entertainment Applications, Farzad Safaei, P. Boustead, C. D. Nguyen, J. Brun, M. Dowlatshahi

Faculty of Informatics - Papers (Archive)

This article evaluates network and server infrastructure requirements to support real-time flows associated with networked entertainment applications. These include the state information flow to update the status of the virtual environment and immersive communication flows such as voice, video, gesture, and haptics communication. The article demonstrates that scaling these applications to large geographical spreads of participants requires distribution of computation to meet the latency constraints of the applications. This latency-driven distribution of computation is essential even when there are no limitations on the availability of computational resources in one location. The article provides detailed results on distributed server architectures for …


Dynamic Resource Adaptation In A Heterogeneous Peer-To-Peer Environment, Letian Rong, I. Burnett Jan 2005

Dynamic Resource Adaptation In A Heterogeneous Peer-To-Peer Environment, Letian Rong, I. Burnett

Faculty of Informatics - Papers (Archive)

This paper focuses on metadata-based, multimedia resource representation and retrieval in a P2P environment as a means of universal multimedia access (UMA). The primary focus of the work is a P2P architecture, which uses MPEG-21 as standards based technique to dynamically adapt resources to various usage environments. In the architecture, a super peer based approach is used to cluster peers, store peer information, perform searches and instruct peers to adapt/send resources. Also a two-stages based adaptation method is introduced to adapt search results and resources in an intelligent manner based on the usage environment attributes. The concept is demonstrated using …


Novel Architecture For Surveillance Cameras With Complementary Metal Oxide Semiconductor Image Sensors, Igor Kharitonenko, Wanqing Li, Chaminda Weerasinghe Jan 2005

Novel Architecture For Surveillance Cameras With Complementary Metal Oxide Semiconductor Image Sensors, Igor Kharitonenko, Wanqing Li, Chaminda Weerasinghe

Faculty of Informatics - Papers (Archive)

This work presents a novel architecture of an intelligent video surveillance camera. It is embedded with automated scene analysis and object behavior detection, so that operators can monitor more venues relying on the system that provides immediate response to suspicious events. The developed camera turns passive video data recording systems into active collaborators with security operators leaving to them only high-level decision making, while automatically carrying out all monotonous work on continuous video monitoring. When there is no alarming activity inside a restricted area the camera automatically turns back to the whole view mode.


Skin Segmentation Using Color Pixel Classification: Analysis And Comparison, Son Lam Phung, A. Bouzerdoum, D. Chai Jan 2005

Skin Segmentation Using Color Pixel Classification: Analysis And Comparison, Son Lam Phung, A. Bouzerdoum, D. Chai

Faculty of Informatics - Papers (Archive)

This work presents a study of three important issues of the color pixel classification approach to skin segmentation: color representation, color quantization, and classification algorithm. Our analysis of several representative color spaces using the Bayesian classifier with the histogram technique shows that skin segmentation based on color pixel classification is largely unaffected by the choice of the color space. However, segmentation performance degrades when only chrominance channels are used in classification. Furthermore, we find that color quantization can be as low as 64 bins per channel, although higher histogram sizes give better segmentation performance. The Bayesian classifier with the histogram …


A New Method For Constructing T-Matrices, M. Xia, Tianbing Xia, Jennifer Seberry, G. Zuo Jan 2005

A New Method For Constructing T-Matrices, M. Xia, Tianbing Xia, Jennifer Seberry, G. Zuo

Faculty of Informatics - Papers (Archive)

For every prime power q = 3 (mod 8) we prove the existence of (q; x, 0, y, y)-partitions of GF(q) with q = x2 + 2y2 for some x, y, which are very useful for constructing SDS, T-matrices and Hadamard matrices. We discuss the transformations of (q; x, 0, y, y)-partitions and, by using the partitions, construct generalized cyclotomic classes which have properties similar to those of classical cyclotomic classes. Thus we provide a new construction for T-matrices of order q2.


The Need For A Digital Aid Framework In Humanitarian Relief, J. Sargent, Katina Michael Jan 2005

The Need For A Digital Aid Framework In Humanitarian Relief, J. Sargent, Katina Michael

Faculty of Informatics - Papers (Archive)

Humanitarian relief organizations are increasingly becoming reliant upon the use of Information Technology & Telecommunications (IT&T) for the distribution of aid to refugees and Internally Displaced Persons (IDP) throughout the world. Traditionally, basic telecommunications infrastructure like the public switch telephone network (PSTN) has been used to transmit important information but today humanitarian relief organizations are attempting to utilize emerging technologies such as global positioning systems (GPS) telephones and geographic information systems (GIS). For the greater part IT&T utilization by relief organizations has happened in an ad-hoc manner in response to specific events. This paper proposes the use of a complete …


Applications Of Human Transponder Implants In Mobile Commerce, Katina Michael, Amelia Masters Jan 2005

Applications Of Human Transponder Implants In Mobile Commerce, Katina Michael, Amelia Masters

Faculty of Informatics - Papers (Archive)

When the ENIAC was launched in 1946, no one could ever have imagined that the giant thinking machine would one day find itself inside the anthropos. However the continuing quest for miniaturisation has made this possible: from luggables to wearables, and now, ultimately to implantable devices. This paper explores the potential for RFID transponder implants in humans for emerging mobile commerce applications. Three usability contexts have been defined to explore the applications which are projected to become mainstream service offerings. This paper is significant because it dispels the common misconception that microchip implants for humans are still some time away. …


A New Divide And Conquer Algorithm For Graph-Based Image And Video Segmentation, Wanqing Li, M. Shi, P. Ogunbona Jan 2005

A New Divide And Conquer Algorithm For Graph-Based Image And Video Segmentation, Wanqing Li, M. Shi, P. Ogunbona

Faculty of Informatics - Papers (Archive)

The concept of the Shortest (or Minimum) Spanning Tree (SST)and Recursive SST (RSST) of an undirected weighted graph has been successfully applied in image segmentation and edge detection. This paper presents a divide-and-conquer approach for (R)SST based image segmentation in order to over-come the problem of high computational complexity associated with conventional graph algorithms. In the simplest form, the proposed approach, block-based RSST (BRSST), first divides the image into rectangular blocks, finds the (R)SST of each block individually using conventional graph algorithms and, then, merges the (R) SSTs of all image blocks to form an (R)SST of the entire image. …


Latency And Scalability: A Survey Of Issues And Techniques For Supporting Networked Games, Xinbo Jiang, Farzad Safaei, P. Boustead Jan 2005

Latency And Scalability: A Survey Of Issues And Techniques For Supporting Networked Games, Xinbo Jiang, Farzad Safaei, P. Boustead

Faculty of Informatics - Papers (Archive)

The popularity of on-line games that emphasize real-time interactivity is on the rise. A survey of issues and techniques for supporting on-line games is provided in this paper. Latency and scalability are two primary aspects on which this survey is based. Network latency heavily influences the design of on-line games with regards to the nature of interactivities involved, as well as, real-time flows such as voice and video if enhanced user immersive experiences are required. As a consequence, a trade-off between consistency and responsiveness, the two latency-related artifacts, is usually needed. This can be demonstrated through a number of latency …


Rendering Models For Immersive Voice Communications Within Distributed Virtual Environment, Ying Peng Que, P. Boustead, Farzad Safaei Jan 2005

Rendering Models For Immersive Voice Communications Within Distributed Virtual Environment, Ying Peng Que, P. Boustead, Farzad Safaei

Faculty of Informatics - Papers (Archive)

This paper compares three possible rendering models for the provision of Immersive Voice Communications (IVCs) in Distributed Virtual Environments (DVEs) such as multiplayer online games. The common aim of these three rendering models is to create a personalised auditory scene for each listening avatar, consisting of a mix of the surrounding avatars' voices, positioned according to their positions in the virtual world. The first two rendering models are based on amplitude panning localisation and HRTF-based binaural localisation respectively. The computation cost of the latter is deemed too large to meet the identified processing power constraints. A computation reuse scheme was …


On Some Applications Of Hadamard Matrices, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki Jan 2005

On Some Applications Of Hadamard Matrices, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki

Faculty of Informatics - Papers (Archive)

Modern communications systems are heavily reliant on statistical techniques to recover information in the presence of noise and interference. One of the mathematical structures used to achieve this goal is Hadamard matrices. They are used in many different ways and some examples are given. This paper concentrates on code division multiple access systems where Hadamard matrices are used for user separation. Two older techniques from design and analysis of experiments which rely on similar processes are also included. We give a short bibliography (from the thousands produced by a google search) of applications of Hadamard matrices appearing since the paper …


The Role Of Small Business Clusters In Prioritising Barriers To E-Commerce Adoption: A Study Of Swedish Regional Smes, Robert Macgregor, Lejla Vrazalic Jan 2005

The Role Of Small Business Clusters In Prioritising Barriers To E-Commerce Adoption: A Study Of Swedish Regional Smes, Robert Macgregor, Lejla Vrazalic

Faculty of Informatics - Papers (Archive)

Despite government initiatives, studies show that SME still fail to realise the benefits of e-commerce adoption. This paper extends existing research by showing that the barriers to e-commerce adoption can be grouped according to two distinct factors: the difficulty of implementing e-commerce and the unsuitability of e-commerce to the business. The paper also shows that the relative importance of these two factors is affected by membership/non-membership of a small business cluster.


Australian Freight Railways For A New Century, Philip G. Laird, Max Michell, Alex Stoney, Gabriella Adorni-Braccesi Jan 2005

Australian Freight Railways For A New Century, Philip G. Laird, Max Michell, Alex Stoney, Gabriella Adorni-Braccesi

Faculty of Informatics - Papers (Archive)

No abstract provided.


A Recommended Communicable Disease Surveillance And Control Network To Secure A Healthy And Happy Olympic Game, Ping Yu, Hui Yu Jan 2005

A Recommended Communicable Disease Surveillance And Control Network To Secure A Healthy And Happy Olympic Game, Ping Yu, Hui Yu

Faculty of Informatics - Papers (Archive)

Accurate surveillance and timely control o f the potential outbreak o f infectious diseases is an integral component for organizing big sport events such as Olympics. It relates to the health and safety o f all o f the event participants, the stability o f the society and the credibility o f the event organizing committee and the country in which the event is hold. The current advancement o f information and communication technology (ICT) provides a great opportunity fo r fast aggregation o f huge amount o f relevant data, accurate analysis and assessment to identify potential epidemics, fast …


A Collaborative Approach To Health Informatics Capacity Building - Learning From Canadian Practice In Fostering Research And Education, Ping Yu, Marilynne Herbert, Francis Lau Jan 2005

A Collaborative Approach To Health Informatics Capacity Building - Learning From Canadian Practice In Fostering Research And Education, Ping Yu, Marilynne Herbert, Francis Lau

Faculty of Informatics - Papers (Archive)

Objectives: Canada and Australia share two priority areas for HI workforce capacity building: to support research and education. This presentation will discuss a collaborative, nationwide health informatics (HI) PhD/Postdoc training program in Canada, which demonstrates a potential solution to meet these priorities. The status of HI higher education in Australia is briefly reviewed. The potential solution in resolving workforce shortage in Australia through adopting overseas practice is discussed, such as implementing a similar collaborative HI research training program across the country. Background: A Think Tank organized by Commonwealth Department of Health and Ageing in 2003 explored the issue of HI …


Distributed Generation Opportunity Under Availability Based Tariff And Reliability Considerations, Ashish Agalgaonkar, S. Khaparde, S. Kulkarni, S. Soman Jan 2005

Distributed Generation Opportunity Under Availability Based Tariff And Reliability Considerations, Ashish Agalgaonkar, S. Khaparde, S. Kulkarni, S. Soman

Faculty of Informatics - Papers (Archive)

Availability Based Tariff (ABT) has been implemented in all the regional grids of India for improving grid discipline by frequency dependent pricing. Currently it is limited to short-term energy transactions between the beneficiary States and Central generating stations without the need for negotiations on price or quantum in real time. In the present scenario, Independent Power Producers (IPP), Captive Power Plants (CPP), small Distributed Generation (DG) like mini-turbine, fuel cell, etc., are not considered under ABT. DG units are normally modular in size and they can be placed close to consumers so as to reduce the T&D costs and losses. …


Performance Of Java Middleware - Java Rmi, Jaxrpc, And Corba, N. A. B. Gray Jan 2005

Performance Of Java Middleware - Java Rmi, Jaxrpc, And Corba, N. A. B. Gray

Faculty of Informatics - Papers (Archive)

Developers of distributed Java systems can now choose among Java-RMI, CORBA, and Web-Service (JAXRPC) middleware technologies. Performance is one factor that has to be considered in choosing the appropriate technology for a particular application. The results presented in this paper show that the nature of response data has a greater impact on relative performance than has been allowed for in most previous studies. Relative performances of the technologies as measured on simple requests and responses are not representative of the behaviour that can be expected in practical applications.


Background Radio Frequency Interference Measurements For Wireless Devices In The Electricity Supply Industry, D A. Robinson, Tadeusz A. Wysocki, Victor W. Smith, Keni Popovski Jan 2005

Background Radio Frequency Interference Measurements For Wireless Devices In The Electricity Supply Industry, D A. Robinson, Tadeusz A. Wysocki, Victor W. Smith, Keni Popovski

Faculty of Informatics - Papers (Archive)

Incorporation of radio controller units into heavy equipment used in the electricity industry provides numerous advantages including: improved electrical isolation between plant and operator, ability to incorporate an additional remote operator, and reductions in vehicle wiring and hydraulic hoses for equipment control. However, secure operation of vehicles and plant incorporating radio control rely on establishing suitable levels of immunity to possible radio frequency interference. Interference levels in close proximity to high voltage power lines are of special concern to the electricity industry. This paper reports on a preliminary investigation into quantifying the levels of background radio interference at such locations …


A Secure Multicast Architecture And Protocol For Mospf, Junqi Zhang, Yi Mu, Vijay Varadharajan Jan 2005

A Secure Multicast Architecture And Protocol For Mospf, Junqi Zhang, Yi Mu, Vijay Varadharajan

Faculty of Informatics - Papers (Archive)

Multicast Open Shortest Path First (MOSPF) is an en hancement to unicast routing protocol OSPF. It has been widely used in many multicast applications for years. How ever, its security is still a major concern in some applica tions. Much work has been done on data protection, but only a few works have been done on member access con trol mechanisms. In this paper, we present a new secure multicast architecture and protocol for MOSPF from the perspective of member access control. Our new model in cludes a variant of previous access control mechanism and a novel distributed encryption scheme. …


Vlsi Implementation Of A Skin Detector Based On A Neural Network, Farid Boussaid, Abdesselam Bouzerdoum, Douglas Chai Jan 2005

Vlsi Implementation Of A Skin Detector Based On A Neural Network, Farid Boussaid, Abdesselam Bouzerdoum, Douglas Chai

Faculty of Informatics - Papers (Archive)

This paper describes the VLSI implementation of a skin detector based on a neural network. The proposed skin detector uses a multilayer perception with three inputs, one hidden layer, one output neuron and a saturating linear activation function to simplify the hardware implementation. The skin detector achieves a classification accuracy of 88.76%. To reduce mismatch associated errors, a single skin detection processing unit is used to classify all pixels of the input RGB image. The current-mode fully analog skin detection processing circuitry only performs computations during the read-out phase, enabling real-time processing. Fully programmable, the proposed skin detection processing circuitry …