Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 301 - 330 of 2013

Full-Text Articles in Physical Sciences and Mathematics

Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim Jan 2010

Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim

Faculty of Informatics - Papers (Archive)

How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-oriented applications such as Internet-based grid systems, e-trading systems, as well as service-oriented computing systems. This paper presents a Priority-Based Trust (PBTrust) model for service selection in general service-oriented environments. The PBTrust is robust and novel from several perspectives. (1) The reputation of a service provider is derived from referees who are third parties and had interactions with the provider in a rich …


Ste3d-Cap: Stereoscopic 3d Captcha, Willy Susilo, Yang-Wai Chow, Huayu Zhou Jan 2010

Ste3d-Cap: Stereoscopic 3d Captcha, Willy Susilo, Yang-Wai Chow, Huayu Zhou

Faculty of Informatics - Papers (Archive)

We present STE3D-CAP (pronounced as “steed-cap” /'stidkæp/), a text-based CAPTCHA that is built from stereoscopic 3D images. This is a completely new direction in CAPTCHA techniques. Our idea is to incorporate stereoscopic 3D images in order to present the CAPTCHA challenge in 3D, which will be easy for humans to read (as the text stands out in the 3D scene) but hard for computers. The main idea is to produce a stereo pair, two images of the distorted 3D text objects generated from two different camera/eye viewpoints, that are presented to a human user’s left and right eyes, respectively. When …


Monitoring Intelligent Distribution Power Systems: A Power Quality Plan, Neil R. Browne, Timothy J. Browne, Sean T. Elphick Jan 2010

Monitoring Intelligent Distribution Power Systems: A Power Quality Plan, Neil R. Browne, Timothy J. Browne, Sean T. Elphick

Faculty of Informatics - Papers (Archive)

Power system monitoring capabilities and requirements are evolving rapidly. The traditional monitoring framework in Australian distribution networks involves biannual readings of maximum demand at each distribution substation. As utilities respond to developments in metering and communications technology, automated collection and retrieval of quasi-real-time system data between substations and central repositories is now feasible. This gives network managers a significantly increased understanding of distribution network dynamic activity such as daily and seasonal load profiles. This leads to the increased ability of utilities to exploit metering data for power quality analysis purposes. This paper examines the scope for, and challenges associated with, …


Information Retrieval And Social Tagging For Digital Libraries Using Formal Concept Analysis, Peter W. Eklund, Peter Goodall, Timothy Wray Jan 2010

Information Retrieval And Social Tagging For Digital Libraries Using Formal Concept Analysis, Peter W. Eklund, Peter Goodall, Timothy Wray

Faculty of Informatics - Papers (Archive)

This paper reports a novel semantic web application developed to deliver a collaborative tagging system for a digital on-line museum. The key features of our application – called the Virtual Museum of the Pacific – concern the browsing and retrieval interface based on Formal Concept Analysis, the extensible distributed data model to support collaborative tagging and its web services implementation.


On The Combination Of Local Texture And Global Structure For Food Classification, Zhimin Zong, Duc Thanh Nguyen, Philip O. Ogunbona, Wanqing Li Jan 2010

On The Combination Of Local Texture And Global Structure For Food Classification, Zhimin Zong, Duc Thanh Nguyen, Philip O. Ogunbona, Wanqing Li

Faculty of Informatics - Papers (Archive)

This paper proposes a food image classification method using local textural patterns and their global structure to describe the food image. In this paper, a visual codebook of local textural patterns is created by employing Scale Invariant Feature Transformation (SIFT) interest point detector with the Local Binary Pattern (LBP) feature. In addition to describing the food image using local texture, the global structure of the food object is represented as the spatial distribution of the local textural structures and encoded using shape context. We evaluated the proposed method on the Pittsburgh Fast-Food Image (PFI) dataset. Experimental results showed that the …


On Optimising Route Discovery For Multi-Interface And Power-Aware Nodes In Heterogeneous Manets, Huda Alaamri, Mehran Abolhasan, Tadeusz A. Wysocki, Justin Lipman Jan 2010

On Optimising Route Discovery For Multi-Interface And Power-Aware Nodes In Heterogeneous Manets, Huda Alaamri, Mehran Abolhasan, Tadeusz A. Wysocki, Justin Lipman

Faculty of Informatics - Papers (Archive)

This paper presents a new routing discovery strategy for heterogeneous MANETs. Node heterogeneity is modeled in terms of: types and number of different interfaces, power, and transmission ranges. Our proposed route discovery algorithm is implemented on the top of On-demand Tree-based Routing Protocol (OTRP) and hence it is called OTRP Heterogeneity-Aware (OTRP HA). OTRP HA utilizes node heterogeneity and optimizes route discovery to reduce overheads and ensures connectivities between different types of nodes with different interfaces. Each node makes its own decision to participate in the route discovery process according to its location, local density, and available resources. Simulation results …


Rotor Position And Speed Estimation Of A Variable Structure Direct-Torque-Controlled Ipm Synchronous Motor Drive At Very Low Speeds Including Standstill, Saad M. Sayeef, Gilbert Foo, Muhammad F. Rahman Jan 2010

Rotor Position And Speed Estimation Of A Variable Structure Direct-Torque-Controlled Ipm Synchronous Motor Drive At Very Low Speeds Including Standstill, Saad M. Sayeef, Gilbert Foo, Muhammad F. Rahman

Faculty of Informatics - Papers (Archive)

The performance of a speed sensorless variable structure direct-torque-controlled interior permanent magnet synchronous motor drive at very low speeds including standstill is investigated in this paper. The rotor position and speed are estimated using a high-frequency (HF) signal injection algorithm at low speeds and a sliding observer at medium to high speeds. The changeover between these two algorithms is performed using a weighting function which smoothly hands over the estimated rotor position information for stator flux and torque estimation purposes. Experiments were performed to test the effectiveness of the proposed HF signal injection algorithm, and results show that the sensorless …


Automating Dimensional Tolerancing Using Ripple Down Rules (Rdr), Ghassan Beydoun, Achim Hoffmann, Ramsey Hamade Jan 2010

Automating Dimensional Tolerancing Using Ripple Down Rules (Rdr), Ghassan Beydoun, Achim Hoffmann, Ramsey Hamade

Faculty of Informatics - Papers (Archive)

We propose to use a knowledge based approach to assist in mechanical design focusing on dimensional tolerancing. To illustrate our approach, we capture the knowledge which human designers utilize in order to specify dimensional tolerances on shafts and mating holes in order to meet desired classes of fit as set by relevant engineering standards. The software system we developed would help mechanical designers become more effective in the time-consuming dimensioning and tolerancing process of their designs in the future. In doing this, the paper makes a twofold contribution to the field of knowledge acquisition: firstly, interface was adjusted to receive …


The Curvhdr Method For Gating Flow Cytometry Samples, Ulrike Naumann, George Luta, Matthew P. Wand Jan 2010

The Curvhdr Method For Gating Flow Cytometry Samples, Ulrike Naumann, George Luta, Matthew P. Wand

Faculty of Informatics - Papers (Archive)

Background: High-throughput flow cytometry experiments produce hundreds of large multivariate samples of cellular characteristics. These samples require specialized processing to obtain clinically meaningful measurements. A major component of this processing is a form of cell subsetting known as gating. Manual gating is timeconsuming and subjective. Good automatic and semi-automatic gating algorithms are very beneficial to highthroughput flow cytometry.

Results: We develop a statistical procedure, named curvHDR, for automatic and semi-automatic gating. The method combines the notions of significant high negative curvature regions and highest density regions and has the ability to adapt well to human-perceived gates. The underlying …


Towards Green Business Process Management, Konstantin Hoesch-Klohe, Aditya K. Ghose, Lam-Son Le Jan 2010

Towards Green Business Process Management, Konstantin Hoesch-Klohe, Aditya K. Ghose, Lam-Son Le

Faculty of Informatics - Papers (Archive)

There is a global consensus on the need to reduce our collective carbon footprint. While much research attention has focused on developing alternative energy sources, automotive technologies or waste disposal techniques, we often ignore the fact that the ability to optimize (existing) operations to reduce their emissions impact is fundamental to this exercise. We believe that by transforming the problem into the domain of Business Process Management (BPM) we can leverage the rich expertise in this field to address issues associated with identifying areas for improvement, understanding the implication and performing carbon footprint minimization. We will use the term “Green …


Business Rules Discovery From Process Design Repositories, Jantima Polpinij, Aditya K. Ghose, Hoa Khanh Dam Jan 2010

Business Rules Discovery From Process Design Repositories, Jantima Polpinij, Aditya K. Ghose, Hoa Khanh Dam

Faculty of Informatics - Papers (Archive)

Traditional process mining approaches focus on extracting process constraints or business rules from repositories of process instances. In this context, process designs or process models tend to be overlooked although they contain information that are valuable for the process of discovering business rules. This paper will propose an alternative approach to process mining in terms of using process designs as the mining resources. We propose a number of techniques for extracting business rules from repositories of business process designs or models, leveraging the well-known Apriori algorithm. Such business rules are then used as a prior knowledge for further analysing, verifying, …


Using Coverage Information To Guide Test Case Selection In Adaptive Random Testing, Zhiquan Zhou Jan 2010

Using Coverage Information To Guide Test Case Selection In Adaptive Random Testing, Zhiquan Zhou

Faculty of Informatics - Papers (Archive)

Random Testing (RT) is a fundamental software testing technique. Adaptive Random Testing (ART) improves the fault-detection capability of RT by employing the location information of previously executed test cases. Compared with RT, test cases generated in ART are more evenly spread across the input domain. ART has conventionally been applied to programs that have only numerical input types, because the distance between numerical inputs is readily measurable. The vast majority of computer programs, however, involve non-numerical inputs. To apply ART to these programs requires the development of effective new distance measures. Different from those measures that focus on the concrete …


A Human Gait Classification Method Based On Radar Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin Jan 2010

A Human Gait Classification Method Based On Radar Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin

Faculty of Informatics - Papers (Archive)

An image classification technique, which has recently been introduced for visual pattern recognition, is successfully applied for human gait classification based on radar Doppler signatures depicted in the time-frequency domain. The proposed method has three processing stages. The first two stages are designed to extract Doppler features that can effectively characterize humanmotion based on the nature of arm swings, and the third stage performs classification. Three types of arm motion are considered: free-arm swings, one-arm confined swings, and no-arm swings. The last two arm motions can be indicative of a human carrying objects or a person in stressed situations. The …


Dynamic Trust Model For Federated Identity Management, Hao Gao, Jun Yan, Yi Mu Jan 2010

Dynamic Trust Model For Federated Identity Management, Hao Gao, Jun Yan, Yi Mu

Faculty of Informatics - Papers (Archive)

The goal of federated identity management is to allow principals, such as identities and attributes, to be shared across trust boundaries based on established policies. Since current Single Sign-On (SSO) mechanism excessively relies on the specifications of Circle of Trust (CoT), the need for service collaboration from different domains is being addressed on CoT. For the motivating issue of the cross-domain SSO mechanism, we need an emergent dynamic trust list for calculating the trust parties, thus, the CoT specifications require an initial effort on enrolling members automatically to adapt to the dynamic open environment. In this paper, we propose a …


Implementing Reactive Bdi Agents With User-Given Constraints And Objectives, Aniruddha Dasgupta, Aditya K. Ghose Jan 2010

Implementing Reactive Bdi Agents With User-Given Constraints And Objectives, Aniruddha Dasgupta, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

CASO is an agent-oriented programming language based on AgentSpeak(L), one of the most influential abstract languages based on the beliefs-desires-intentions (BDI) architecture. For many applications, it is more convenient to let the user provide in real time, a more elaborate specification consisting of constraints and preferences over possible goal states. Then, let the system discover a plan for the most desirable among the feasible goal states. CASO incorporates constraints and objectives into the symbolic approach of reactive BDI model which lead to better expressive capabilities as well as more efficient computation. Jason is a fully-fledged interpreter for a much improved …


Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher Jan 2010

Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher

Faculty of Informatics - Papers (Archive)

Data security and information privacy are the important aspects to consider for the use of mobile technology for recording clinical experience and encounter in medical education. Objective: This study aims to address the qualitative findings of the appropriate data security and information privacy for PDA accessible clinical-log in problem-based learning (PBL) approach in medical education. Method: The semi-structured interviews were conducted with the medical faculty members, honorary clinical academics and medical education technology specialists. Results: Data security and information access plan were determined for managing clinical-log data. The results directed the guideline for the future development and implementation of clinical-log …


Soliton Steering By Longitudinal Modulation Of The Nonlinearity In Waveguide Arrays, Gaetano Assanto, Luis A. Cisneros, Antonmaria A. Minzoni, Benjamin D. Skuse, Noel F. Smyth, Annette L. Worthy Jan 2010

Soliton Steering By Longitudinal Modulation Of The Nonlinearity In Waveguide Arrays, Gaetano Assanto, Luis A. Cisneros, Antonmaria A. Minzoni, Benjamin D. Skuse, Noel F. Smyth, Annette L. Worthy

Faculty of Informatics - Papers (Archive)

We show how discrete solitary waves in one and two-dimensional waveguide arrays can be steered across the lattice via the introduction of a longitudinal periodic modulation of the nonlinear response. Through parametric energy transfer from the modulation to the solitary wave, the latter can increase its width and overcome the Peierls-Nabarro potential to propagate freely.


Support-Based Distributed Optimisation: An Approach To Radiotherapy Patient Scheduling, Graham Billiau, Chee-Fon Chang, Andrew Alexis Miller, Aditya K. Ghose Jan 2010

Support-Based Distributed Optimisation: An Approach To Radiotherapy Patient Scheduling, Graham Billiau, Chee-Fon Chang, Andrew Alexis Miller, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

In the health system inefficiency leads to poor use of scarce expensive resources. Lengthy patient treatment waiting time can result from inefficiency in scheduling. The use of state-of-the art multi-agent and distributed computing technologies can provide a solution to address this problem. However, distributed optimisation in such a multi-agent setting poses an important challenge that requires protocols to enable agents to optimise shared objectives without necessarily revealing all of their private constraints. In this study we show that if the problem is expressed as a Dynamic Distributed Constraint Optimisation Problem a powerful algorithm such as SBDO can be deployed to …


Finding Distinctive Facial Areas For Face Recognition, Ce Zhan, Wanqing Li, Philip O. Ogunbona Jan 2010

Finding Distinctive Facial Areas For Face Recognition, Ce Zhan, Wanqing Li, Philip O. Ogunbona

Faculty of Informatics - Papers (Archive)

One of the key issues for local appearance based face recognition methods is that how to find the most discriminative facial areas. Most of the existing methods take the assumption that anatomical facial components, such as the eyes, nose, and mouth, are the most useful areas for recognition. Other more elaborate methods locate the most salient parts within the face according to a pre-specified criterion. In this paper, a novel method is proposed to identify the discriminative facial areas for face recognition. Unlike the existing methods that only analyze the given face, the proposed method identifies the distinctive areas of …


Experimental Evaluation Of Ieee 802.11s Path Selection Protocols In A Mesh Testbed, Jerry Chun-Ping Wang, Brett Hagelstein, Mehran Abolhasan Jan 2010

Experimental Evaluation Of Ieee 802.11s Path Selection Protocols In A Mesh Testbed, Jerry Chun-Ping Wang, Brett Hagelstein, Mehran Abolhasan

Faculty of Informatics - Papers (Archive)

IEEE 802.11s is an upcoming standard that defines how wireless devices can interconnect in a multi-hop configuration. While there are several protocol stacks based on the IEEE 802.11s draft standard, there has not been a formal study or comparison examining their practical performance. This paper evaluates the routing performance of open80211s in a real-world mesh testbed. The experiments benchmark open80211s against two established network layer routing protocols - OLSR and B.A.T.M.A.N.. The experimental results show that open80211s does not outperform existing routing protocols in practice. This indicates that more design and development effort is required for IEEE 802.11s to yield …


Network Reconfiguration Using Psat For Loss, Essa-J-Abdul Zehra, Mahmoud Moghavvemi, Maher M.I. Hasim, Kashem Muttaqi Jan 2010

Network Reconfiguration Using Psat For Loss, Essa-J-Abdul Zehra, Mahmoud Moghavvemi, Maher M.I. Hasim, Kashem Muttaqi

Faculty of Informatics - Papers (Archive)

Network reconfiguration in distribution system is realized by changing the status of sectionalizing switches, and is usually done for the purpose of loss reduction. Loss reduction can result in substantial benefits for a utility. Other benefits from loss reduction include increased system capacity, and possible deferment or elimination of capital expenditures for system improvements and expansion. There is also improved voltage regulation as a result of reducing feeder voltage drop. Research work included by this paper focuses on using branch exchange method to minimize losses and solve the problems over different radial configuration. Solution’s algorithm for loss minimization has been …


The Detection Of Steam Injection Based On Video Surveillance, Yipeng Guo, Shu Wang, Ming Zhu, Jiangtao Xi Jan 2010

The Detection Of Steam Injection Based On Video Surveillance, Yipeng Guo, Shu Wang, Ming Zhu, Jiangtao Xi

Faculty of Informatics - Papers (Archive)

In this paper, we focus on the visual features of steam injection and propose an integrated algorithm to detect it based on video surveillance. The proposed method is depended on three decision rules which are the attribute of gray level and the feature of frequent flicker rate of steam injection, and the similarity structure between background image and current frame. The block-based approach is applied to all three decision rules. The experimental results show that the algorithm provides a reliable detection method which is useful in many cases such as the alarm on the leakage of a heating pipe.


The Electrical Performance Of Modern Compact Fluorescent Lamps, Sean T. Elphick, Philip Ciufo, Sarath Perera Jan 2010

The Electrical Performance Of Modern Compact Fluorescent Lamps, Sean T. Elphick, Philip Ciufo, Sarath Perera

Faculty of Informatics - Papers (Archive)

Compact Fluorescent Lamps (CFL) are highly non-linear devices which are likely to experience very high growth in penetration levels, especially in domestic environments, in Australia over the next 2 – 3 years. This will occur due to the decision taken by the Australian Federal Government to ban the sale of incandescent light globes after 2009 as measures towards meeting the needs for demand side management and climate change abatement. While CFL technology has been in existence since the late 1980s penetration levels are now increasing to a point where the total CFL load cannot be considered negligible compared to other …


Phase Transition On The Toeplitz Algebra Of The Affine Semigroup Over The Natural Numbers, Marcelo Laca, Iain F. Raeburn Jan 2010

Phase Transition On The Toeplitz Algebra Of The Affine Semigroup Over The Natural Numbers, Marcelo Laca, Iain F. Raeburn

Faculty of Informatics - Papers (Archive)

We show that the group of orientation-preserving affine transformations of the rational numbers is quasi-lattice ordered by its subsemigroup NN×. The associated Toeplitz C-algebra T(NN×) is universal for isometric representations which are covariant in the sense of Nica. We give a presentation of T(NN×) in terms of generators and relations, and use this to show that the C-algebra QN recently introduced by Cuntz is the boundary quotient of in the sense of Crisp and Laca. The Toeplitz algebra T …


Scale Loss And Mortality In Angled-And-Released Eastern Sea Garfish (Hyporhamphus Australis), Paul A. Butcher, Matt K. Broadhurst, Karina C. Hall, Brian R. Cullis, Robert G. Nicoll Jan 2010

Scale Loss And Mortality In Angled-And-Released Eastern Sea Garfish (Hyporhamphus Australis), Paul A. Butcher, Matt K. Broadhurst, Karina C. Hall, Brian R. Cullis, Robert G. Nicoll

Faculty of Informatics - Papers (Archive)

The eastern sea garfish (Hyporhamphus australis) is an endemic Australian marine teleost that is angled in large numbers throughout its distribution. Most fish are retained, although some are released, mainly because of size-grading in response to bag limits. Owing to their fragility, there are concerns that few released fish survive. To investigate this assumption, 185 angled and 90 control eastern sea garfish were released in groups of five into holding cages, then monitored for up to 24 h. One control and 93 angled fish died, providing an adjusted angled mortality rate of 49.2%. All fish that ingested their hooks (n¼7) …


Object Detection Using Non-Redundant Local Binary Patterns, Duc Thanh Nguyen, Zhimin Zong, Philip Ogunbona, Wanqing Li Jan 2010

Object Detection Using Non-Redundant Local Binary Patterns, Duc Thanh Nguyen, Zhimin Zong, Philip Ogunbona, Wanqing Li

Faculty of Informatics - Papers (Archive)

Local Binary Pattern (LBP) as a descriptor, has been successfully used in various object recognition tasks because of its discriminative property and computational simplicity. In this paper a variant of the LBP referred to as Non-Redundant Local Binary Pattern (NRLBP) is introduced and its application for object detection is demonstrated. Compared with the original LBP descriptor, the NRLBP has advantage of providing a more compact description of object’s appearance. Furthermore, the NRLBP is more discriminative since it reflects the relative contrast between the background and foreground. The proposed descriptor is employed to encode human’s appearance in a human detection task. …


Message From The Dean Of The Faculty, Philip Ogunbona Jan 2010

Message From The Dean Of The Faculty, Philip Ogunbona

Faculty of Informatics - Papers (Archive)

The Faculty of Informatics at the University of Wollongong is proud to be co-hosting the 2010 IEEE International Symposium on Technology and Society. It is very fitting that this symposium is being held at the University of Wollongong where a purpose-built faculty has been created to educate graduates who will become leaders and provide technological solutions to the complex problems in the information and communication industry and society at large.


Human Detection Using Local Shape And Non-Redundant Binary Patterns, Duc Thanh Nguyen, Wanqing Li, Philip Ogunbona Jan 2010

Human Detection Using Local Shape And Non-Redundant Binary Patterns, Duc Thanh Nguyen, Wanqing Li, Philip Ogunbona

Faculty of Informatics - Papers (Archive)

Motivated by the advantages of using shape matching technique in detecting objects in various postures and viewpoints and the discriminative power of local patterns in object recognition, this paper proposes a human detection method combining both shape and appearance cues. In particular, local shapes of the body parts are detected using template matching. Based on body parts' shapes, local appearance features are extracted. We introduce a novel local binary pattern (LBP) descriptor, called Non-Redundant LBP (NRLBP), to encode local appearance of human. The proposed method was evaluated and compared with other state-of-the-art human detection methods on two commonly used datasets: …


Business Relationships In China: Lessons About Deep Trust, A. Kriz, Byron W. Keating Jan 2010

Business Relationships In China: Lessons About Deep Trust, A. Kriz, Byron W. Keating

Faculty of Informatics - Papers (Archive)

Trust is acknowledged as a central tenet of business relationships. Yet for all the attention it receives, rarely has trust been investigated in the Chinese business setting. This paper uses an emic approach to unearth some within- culture ‘truths’ about Chinese notions of trust in business exchange. The findings of this research suggest that deep trust (xinren), which is driven by reciprocal help and emotional bonding, is critical for doing business in China. A conceptual framework is provided to assist Western businesspersons to better understand the Chinese concept of trust as well as the interplay between its key antecedents.


Unpacking The Rfid Investment Decision, Byron W. Keating, Tim R. Coltman, Samuel Fosso Wamba, Valerie Baker Jan 2010

Unpacking The Rfid Investment Decision, Byron W. Keating, Tim R. Coltman, Samuel Fosso Wamba, Valerie Baker

Faculty of Informatics - Papers (Archive)

Mandates aside, there are many reasons why firms decide to move forward with or delay investment in RFID technology. In this paper we use a theoretically based, easy to implement methodology to empirically derive a relative importance scale of those factors that influence the decision to invest in RFID technology. More specifically, we compare the factors that matter most and least to a sample of firms that have adopted RFID technology with a sample of firms that have yet to embrace RFID technology. The theoretical and practical implications are that both RFID adopters and non adopters are driven by the …