Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 481 - 510 of 2013

Full-Text Articles in Physical Sciences and Mathematics

The Privacy-Value-Control Harmonization For Rfid Adoption In Retail, B. D. Renegar, Katina Michael Jan 2009

The Privacy-Value-Control Harmonization For Rfid Adoption In Retail, B. D. Renegar, Katina Michael

Faculty of Informatics - Papers (Archive)

Privacy concerns have, at least in part, impeded the adoption of radio frequency identification (RFID) in retail. The adoption of other automatic identification (auto-ID) applications shows that consumers often are willing to trade their privacy or their control of personal information against some value afforded by the application. In this paper, the interplay between privacy, value, and control is examined through a literature survey of four auto-ID applications: mobile phone, electronic toll collection, e-passports, and loyalty programs. The consumer value proposition for the use of RFID in retail is investigated through an online survey exploring end-user perceptions. The results of …


Overcoming Visibility Issues In A Small-To-Medium Retailer Using Automatic Identification And Data Capture Technology: An Evolutionary Approach, D. Hamilton, Katina Michael, Samuel Fosso Wamba Jan 2009

Overcoming Visibility Issues In A Small-To-Medium Retailer Using Automatic Identification And Data Capture Technology: An Evolutionary Approach, D. Hamilton, Katina Michael, Samuel Fosso Wamba

Faculty of Informatics - Papers (Archive)

The aim of this paper is to review the inventory control practices of a small-to-medium retailer, in order to identify common challenges these organizations experience with respect to automated data capture (ADC) and the implementation of an enterprise wide information system. The study explores a single case of a hardware store in a regional town of NSW, Australia. Four semistructured interviews were conducted with employees of a small-to-medium retailer focusing on issues related to inventory control including: delivery discrepancies, the checking and sorting of orders, locating stock and goods, loss prevention, customer purchasing and point of sale processing and replenishment. …


Financial Risk And Its Impact On New Purchasing Behavior In The Online Retail Setting, Byron W. Keating, A. M. Quazi, A. Kriz Jan 2009

Financial Risk And Its Impact On New Purchasing Behavior In The Online Retail Setting, Byron W. Keating, A. M. Quazi, A. Kriz

Faculty of Informatics - Papers (Archive)

This paper examines the effect of financial risk on perceptions of service quality and relationship-marketing quality in the online retail environment. Perceptions of financial risk were found to be negatively associated with service quality. In particular, a well-designed and attractive Web site was found to mitigate perceptions of financial risk during early trial-buy purchasing. Relationship-marketing quality was not affected by financial risk. This study adds to an enhanced understanding of how risk perceptions influence assessment of service quality and relationship-marketing quality. While the drivers of service quality and relationship-marketing quality have been examined extensively in the online setting, a surprising …


Color As A Source Of Brand Differentiation: Can It Be Defended?, Byron W. Keating, T. R. Coltman Jan 2009

Color As A Source Of Brand Differentiation: Can It Be Defended?, Byron W. Keating, T. R. Coltman

Faculty of Informatics - Papers (Archive)

Savvy marketers have long sought to exploit the psychological effects of color to differentiate their brands and create competitive advantage: IBM Blue, Coca- Cola Red, and BP Green. These are not new colors but well-known brand colors. While changes in international trademark law over the past decade paved the way for marketers to seek protection for a color associated with a brand, this case demonstrates some important challenges in defending such trademarks.


Supply Chain Contract Evolution, T. Coltman, K. Bru, N. Perm-Ajchariyawong, T. M. Devinney, G. R. Benito Jan 2009

Supply Chain Contract Evolution, T. Coltman, K. Bru, N. Perm-Ajchariyawong, T. M. Devinney, G. R. Benito

Faculty of Informatics - Papers (Archive)

This paper draws together theories from organisational and neo-institutional literatures to address the evolution of supply chain contracts. Using a longitudinal case study of the Norwegian State Railways, we examine how firms move through the stages in an inter-organisational process of supply chain contract evolution and how they can cooperate to ensure efficiency and equity in their contractual relationship. The findings suggest that inefficient and inequitable initial contracts can occur in part, because of the cognitive shortcomings in human decision-making processes that reveal themselves early in the arrangement before learning and trust building can accumulate. We then reveal how parties …


Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty Jan 2009

Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty

Faculty of Informatics - Papers (Archive)

The analysis of vulnerabilities in large complex spaces is fundamentally problematic. The lack of capacity to generate a threat assessment merely exacerbates this problem. Lacking as well, in current literature is a developed methodology. To overcome this problem, we propose an approach using multi-agent modelling, which is also melded with three dimensional (3D) tactical understandings. Our approach builds on a microsimulation decision support tool, which was developed for a behavioural simulation of CBRN events. Microsimulation is based on the individual; who as an individual has a number of attributes, and which are stochastic (when repeated within an attribute). This approach …


Teaching Statistics Using A Blended Approach: Integrating Technology-Based Resources, N. Baharun, A. Porter Jan 2009

Teaching Statistics Using A Blended Approach: Integrating Technology-Based Resources, N. Baharun, A. Porter

Faculty of Informatics - Papers (Archive)

This paper presents the results of a study investigating the use of face-to-face components of teaching and technology-based resources in teaching statistics via a blended approach. The student perspective is the focus of investigation which involved 38 on-campus students who enrolled in an introductory statistics subject at University of Wollongong. Assessment items and the laboratory manual and tasks that precede assessment were found to be of greatest importance in assisting students to understand. Students’ perceptions were that learning outcomes were positively impacted by both traditional and technologically based resources both in terms of student understanding of topics and increased their …


Face Recognition Using A Time-Of-Flight Camera, Simon Meers, Koren Ward Jan 2009

Face Recognition Using A Time-Of-Flight Camera, Simon Meers, Koren Ward

Faculty of Informatics - Papers (Archive)

This paper presents a novel three-dimensional (3D) method for detecting, tracking and recognising human faces using a time-of-flight camera. The system works by detecting a single central feature point, typically the nose tip, and by intersecting the 3D point data with spheres centred at the central feature point. The resulting spherical intersection profiles are used to perform face recognition and to track the position and orientation of the face. The main benefit of this method is that it is fast and efficient in terms or memory and computational expense. Furthermore, as the system utilises a time-of-flight camera and topographical information, …


Generic Constructions For Universal Designated-Verifier Signatures And Identity-Based Signatures From Standard Signatures, S. F. Shahandashti, R. Safavi-Naini Jan 2009

Generic Constructions For Universal Designated-Verifier Signatures And Identity-Based Signatures From Standard Signatures, S. F. Shahandashti, R. Safavi-Naini

Faculty of Informatics - Papers (Archive)

We give a generic construction for universal designated-verifier signature schemes from a large class, C, of signature schemes. The resulting schemes are efficient and have two important properties. Firstly, they are provably DV-unforgeable, non-transferable and also non-delegatable. Secondly, the signer and the designated verifier can independently choose their cryptographic settings. We also propose a generic construction for identity-based signature schemes from any signature scheme in C and prove that the construction is secure against adaptive chosen message and identity attacks. We discuss possible extensions of our constructions to hierarchical identity-based signatures, identity-based universal designated verifier signatures, and identity-based ring signatures …


Business Process Integration: Method And Analysis, Evan D. Morrison, Alex Menzies, George Koliadis, Aditya K. Ghose Jan 2009

Business Process Integration: Method And Analysis, Evan D. Morrison, Alex Menzies, George Koliadis, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

In the study of business management, process integration has become an interesting area of research that affects analysts studying and working on existing system plans. Process integration aims to investigate relationships across a business compendium to produce classifications and merge similar activities into a standardized system. Integration is the process of merging elements from two similar antecedent processes to create a single process that can be used to replace the original processes. This paper proposes a practical method for process integration and provides a theoretical framework and metrics for business process integration assessment. In the provision of metrics that take …


Dealing With Imprecise Compliance Requirements, Evan D. Morrison, Aditya K. Ghose, George Koliadis Jan 2009

Dealing With Imprecise Compliance Requirements, Evan D. Morrison, Aditya K. Ghose, George Koliadis

Faculty of Informatics - Papers (Archive)

Business process compliance management is a field of study involving the co-ordination of business process management and compliance systems. A compliance system is an organisation wide tool that links legislative and business rules to organization policies and processes. The objective of such a system is to promote a self sustaining level of operations that minimizes the losses caused to the business through breaches of laws or internal misappropriations. We view a compliance system in a similar fashion to that of an accounting system where each process is treated as a transaction. Each process may be monitored and valuations of costing …


A Contingency Model For Creating Value From Rfid Supply Chain Network Projects In Logistics And Manufacturing Environments, S. F. Wamba, A. T. Chatfield Jan 2009

A Contingency Model For Creating Value From Rfid Supply Chain Network Projects In Logistics And Manufacturing Environments, S. F. Wamba, A. T. Chatfield

Faculty of Informatics - Papers (Archive)

In the growing literature on RFID and other network technologies, the importance of organizational transformation at the supply chain level has been recognized. However, the literature lacks conceptual model development and salient mechanisms for achieving the level of organizational transformation required for stakeholders to realize the full business benefits from RFID projects. Furthermore, the RFID adoption, use, and impact studies to date largely focus on a single firm setting and on the retail sector. Therefore, this study intends to fill this knowledge gap in the literature, and develop a contingency model for creating value from RFID supply chain projects in …


Experiences Of Users From Online Grocery Stores, Mark Freeman Jan 2009

Experiences Of Users From Online Grocery Stores, Mark Freeman

Faculty of Informatics - Papers (Archive)

Grocery shopping, traditionally considered as the pinnacle of the selfservice industry, is used as the case study in this chapter. As the Internet has become widely used by many segments of the population, the opportunity to shop online for groceries has been presented to consumers. This chapter considers issues that need to be addressed to make online grocery shopping systems more usable for these consumers, based on feedback from individuals who participated in a study of user interactions with Australian online grocery stores.


A Dynamic Platform For Workflow Management Using Web Services: A Hospital Scenario, Joshua P. Fan, Nantika Prinyapol, Sim K. Lau Jan 2009

A Dynamic Platform For Workflow Management Using Web Services: A Hospital Scenario, Joshua P. Fan, Nantika Prinyapol, Sim K. Lau

Faculty of Informatics - Papers (Archive)

In this paper, we propose the use of dynamic compilation of web services to support workflow management. Web services related to work practices belong to an organisation will be designed, built and stored in a web services repository. These web services can be shared with multiple functional units within the organisation via the intranet or the internet. Work practice services that were selected will be compiled logically and optimally using the proposed dynamic compilation platform.


Zigzag Carbon Nanotubes With Generic Electron-Electron Interactions, James M. Hill, J. E. Bunder Jan 2009

Zigzag Carbon Nanotubes With Generic Electron-Electron Interactions, James M. Hill, J. E. Bunder

Faculty of Informatics - Papers (Archive)

A Hamiltonian is derived for a zigzag carbon nanotube with an arbitrary number of weak electron-electron charge and spin interactions, which become significant in ultraclean systems. The renormalization group and bosonization are used to determine the ground-state phase diagram. Our phase diagram contains some exotic phases which have not previously been predicted in carbon nanotubes with physically possible interaction profiles. Phases of the undoped case include Mott insulators and a variety of density wave states. In the doped case a Tomanaga-Luttinger liquid is possible.


Ruderman-Kittel-Kasuya-Yosida Interactions On A Bipartite Lattice, Hsiu-Hau Lin, J. E. Bunder Jan 2009

Ruderman-Kittel-Kasuya-Yosida Interactions On A Bipartite Lattice, Hsiu-Hau Lin, J. E. Bunder

Faculty of Informatics - Papers (Archive)

Carrier-mediated exchange coupling, known as Ruderman-Kittel-Kasuya-Yosida (RKKY) interaction, plays a fundamental role in itinerant ferromagnetism and has great application potentials in spintronics. A recent theorem based on the imaginary-time method shows that the oscillatory RKKY interaction becomes commensurate on bipartite lattice and predicts that the effective exchange coupling is always ferromagnetic for the same sublattice but antiferromagnetic for opposite sublattices. We revisit this important problem by real- and imaginary-time methods and find the theorem misses important contributions from zero modes. To illustrate the importance of zero modes, we study the spin susceptibility in graphene nanoribbons numerically. The effective exchange coupling …


Electronic Properties Of Silicon Nanotubes With Distinct Bond Lengths, James M. Hill, J E. Bunder Jan 2009

Electronic Properties Of Silicon Nanotubes With Distinct Bond Lengths, James M. Hill, J E. Bunder

Faculty of Informatics - Papers (Archive)

We analyze the band structure of a silicon nanotube with sp^3 bonds and variable bond lengths. This nanotube has many similarities with a carbon nanotube including a band gap at half-filling and conducting behavior which is dependent on structure. We derive a simple formula which predicts when the nanotube is metallic. We discuss our results in the context of a nanotube subject to small applied strains as this provides a means of distorting bond lengths in a predictable way and may be tested experimentally. The affects of strain on nanotube conductance has important implications for sensor technology.


Generic Short-Range Interactions In Two-Leg Ladders, J. E. Bunder, Hsiu-Hau Lin Jan 2009

Generic Short-Range Interactions In Two-Leg Ladders, J. E. Bunder, Hsiu-Hau Lin

Faculty of Informatics - Papers (Archive)

We derive a Hamiltonian for a two-leg ladder which included an arbitrary number of charge and spin interactions which must be weak but are otherwise of arbitrary strength. To illustrate the Hamiltonian we consider two examples and use a renormalization-group technique to evaluate the ground-state phases.


Concurrent Magnetic And Metal-Insulator Transitions In Eu1-Xsmxb6, J. E. Bunder, Sung-Ik Lee, Hsiu-Hau Lin, S. Yeo, Myung-Hwa Jung Jan 2009

Concurrent Magnetic And Metal-Insulator Transitions In Eu1-Xsmxb6, J. E. Bunder, Sung-Ik Lee, Hsiu-Hau Lin, S. Yeo, Myung-Hwa Jung

Faculty of Informatics - Papers (Archive)

The effects of magnetic doping on a EuB6 single crystal were investigated based on magnetic and transport measurements. A modest 5% Sm substitution for Eu changes the magnetic and transport properties dramatically and gives rise to concurrent ant--ferromagnetic and metal-insulator transtitions (MITs) from ferromagnetic MIT for EuB6.


Olsr-R^3: Optimised Link State Routing With Reactive Route Recovery, Jerry Chun-Ping Wang, Farzad Safaei, Mehran Abolhasan, Daniel R. Franklin Jan 2009

Olsr-R^3: Optimised Link State Routing With Reactive Route Recovery, Jerry Chun-Ping Wang, Farzad Safaei, Mehran Abolhasan, Daniel R. Franklin

Faculty of Informatics - Papers (Archive)

The Optimised Link State Routing (OLSR) is a proactive routing protocol which relies on periodical broadcast of routing packets. However, due to the one-to-many relationship of broadcast traffic, the delivery of these packets can not be guaranteed by underlying MAC protocol, particularly in a congested condition. In this paper, the possible routing pathologies and failures of OLSR in a congested network are explored. In addition, a hybrid routing protocol which integrates OLSR with Reactive Route Recovery (OLSR-R3) is proposed to rectify the erratic routing behaviour described in this paper. Simulation studies are presented which show that the proposed solution is …


A Communications Policy Perspective On Ctc Sustainability In Regional Australia: Normative Assumptions, Commercial Viability And Social Good, William Tibben Jan 2009

A Communications Policy Perspective On Ctc Sustainability In Regional Australia: Normative Assumptions, Commercial Viability And Social Good, William Tibben

Faculty of Informatics - Papers (Archive)

This paper investigates the influence of the normative assumptions that can be associated with the Community Technology Centers (CTCs) scheme in New South Wales, Australia during the period 2000-2005 (CTC@NSW). It does this by developing an analytical framework based on Australian communications policy to assess case study accounts of selected CTCs. In drawing conclusions about the normative assumptions that guided the implementation of the CTC@NSW scheme, the sufficiency of market based development strategies are questioned when challenging economic circumstances suggest the need for ongoing strategic assistance from government.


A Family Of 2-Graphs Arising From Two-Dimensional Subshifts, David Pask, Iain Raeburn, Natasha A. Weaver Jan 2009

A Family Of 2-Graphs Arising From Two-Dimensional Subshifts, David Pask, Iain Raeburn, Natasha A. Weaver

Faculty of Informatics - Papers (Archive)

Higher-rank graphs (or k-graphs) were introduced by Kumjian and Pask to provide combinatorial models for the higher-rank Cuntz-Krieger C*-algebras of Robertson and Steiger. Here we consider a family of finite 2-graphs whose path spaces are dynamical systems of algebraic origin, as studied by Schmidt and others.


End-To-End Path Stability Of Reactive Routing Protocols In Ieee 802.11 Ad Hoc Networks, Daniel R. Franklin, Jerry Chun-Ping Wang, Mehran Abolhasan, Farzad Safaei Jan 2009

End-To-End Path Stability Of Reactive Routing Protocols In Ieee 802.11 Ad Hoc Networks, Daniel R. Franklin, Jerry Chun-Ping Wang, Mehran Abolhasan, Farzad Safaei

Faculty of Informatics - Papers (Archive)

Over the years, a considerable research effort has been applied to the design of ad hoc network routing protocols. However, there is still a lack of understanding of the subtle interactions between routing protocols and lower layers in the protocol stack. In this paper, the instability which may arise when reactive routing protocols interact with the IEEE 802.11 MAC protocol is investigated. In particular, several erratic behaviours of the Ad hod On-demand Distance Vector (AODV) routing protocol in a congested IEEE 802.11 ad hoc network are demonstrated. A cross-layer solution is proposed based on an Adaptive Bulk Trigger policy and …


Simplicity Of C*-Algebras Associated To Row-Finite Locally Convex Higher-Rank Graphs, David Robertson, Aidan Sims Jan 2009

Simplicity Of C*-Algebras Associated To Row-Finite Locally Convex Higher-Rank Graphs, David Robertson, Aidan Sims

Faculty of Informatics - Papers (Archive)

In a previous work, the authors showed that the C*-algebra C*(\Lambda) of a row-finite higher-rank graph \Lambda with no sources is simple if and only if \Lambda is both cofinal and aperiodic. In this paper, we generalise this result to row-finite higher-rank graphs which are locally convex (but may contain sources). Our main tool is Farthing's "removing sources" construction which embeds a row-finite locally convex higher-rank graph in a row-finite higher-rank graph with no sources in such a way that the associated C*-algebras are Morita equivalent.


Differential Space-Time-Frequency Codes For Mb-Ofdm Uwb With Dual Carrier Modulation, Alfred Mertins, Le Chung Tran Jan 2009

Differential Space-Time-Frequency Codes For Mb-Ofdm Uwb With Dual Carrier Modulation, Alfred Mertins, Le Chung Tran

Faculty of Informatics - Papers (Archive)

In a multiple-input multiple-output (MIMO) multiband orthogonal frequency division multiplexing (MB-OFDM) ultra-wideband (UWB) system, coherent detection where the channel state information (CSI) is assumed to be exactly known at the receiver requires the transmission of a large number of symbols for channel estimation, thus reducing the bandwidth efficiency. This paper examines the use of unitary differential space-time frequency codes (DSTFCs) in MB-OFDM UWB, which increases the system bandwidth efficiency due to the fact that no CSI is required for differential detection. The proposed DSTFC MB-OFDM system would be useful when the transmission of multiple channel estimation symbols is impractical or …


Mixing Them Up: Group-Work With Nesb Students, Mark Freeman Jan 2009

Mixing Them Up: Group-Work With Nesb Students, Mark Freeman

Faculty of Informatics - Papers (Archive)

This paper describes the implementation of a Problem-Based Learning assessment in a postgraduate ICT fundamentals subject. With an entirely international student cohort drawn from 14 countries, many students had never participated in group work. To facilitate student adjustment into the Australian educational environment, and develop understanding of the role and importance of group work, students were educated in group work theory prior to engaging in the group work process. The experiences of both teaching staff and students identified a number of positive outcomes resulting from this approach.


A New Approach To Sparse Image Representation Using Mmv And K-Svd, Jie Yang, Abdesselam Bouzerdoum, Son Lam Phung Jan 2009

A New Approach To Sparse Image Representation Using Mmv And K-Svd, Jie Yang, Abdesselam Bouzerdoum, Son Lam Phung

Faculty of Informatics - Papers (Archive)

This paper addresses the problem of image representation based on a sparse decomposition over a learned dictionary. We propose an improved matching pursuit algorithm for Multiple Measurement Vectors (MMV) and an adaptive algorithm for dictionary learning based on multi-Singular Value Decomposition (SVD), and combine them for image representation. Compared with the traditional K-SVD and orthogonal matching pursuit MMV (OMPMMV) methods, the proposed method runs faster and achieves a higher overall reconstruction accuracy.


Unitary Differential Space-Time-Frequency Codes For Mb-Ofdm Uwb, Le Chung Tran, Alfred Mertins, E. Dutkiewicz, Xiaojing Huang Jan 2009

Unitary Differential Space-Time-Frequency Codes For Mb-Ofdm Uwb, Le Chung Tran, Alfred Mertins, E. Dutkiewicz, Xiaojing Huang

Faculty of Informatics - Papers (Archive)

In a multiple-input multiple-output (MIMO) multiband orthogonal frequency division multiplexing (MB-OFDM) ultra-wideband (UWB) system, coherent detection where the channel state information (CSI) is assumed to be exactly known at the receiver requires the transmission of a large number of symbols for channel estimation, thus reducing the bandwidth efficiency. This paper examines the use of unitary differential space-time frequency codes (DSTFCs) in MB-OFDM UWB, which increases the system bandwidth efficiency due to the fact that no CSI is required for differential detection. The proposed DSTFC MB-OFDM system would be useful when the transmission of multiple channel estimation symbols is impractical or …


Space-Time-Frequency Code Implementation In Mb-Ofdm Uwb Communications: Design Criteria And Performance, Alfred Mertins, Le Chung Tran Jan 2009

Space-Time-Frequency Code Implementation In Mb-Ofdm Uwb Communications: Design Criteria And Performance, Alfred Mertins, Le Chung Tran

Faculty of Informatics - Papers (Archive)

This paper proposes a general framework of Space-Time-Frequency Codes (STFCs) for Multi-Band Orthogonal Frequency Division Multiplexing (MB-OFDM) Ultra-Wide Band (UWB) communications systems. A great similarity between the STFC MB-OFDM UWB systems and conventional wireless Complex Orthogonal Space-Time Block Code (CO STBC) Multiple-Input Multiple-Output (MIMO) systems is discovered. This allows us to quantify the pairwise error probability (PEP) of the proposed system and derive the general decoding method for the implemented STFCs. Based on the theoretical analysis results of PEP, we can further quantify the diversity order and coding gain of MB-OFDM UWB systems, and derive the design criteria for STFCs, …


Novel Cooperative Communication Schemes For Space-Time-Frequency Coded Mb-Ofdm Uwb, Le Chung Tran, Xiaojing Huang, Alfred Mertins, Eryk Dutkiewicz Jan 2009

Novel Cooperative Communication Schemes For Space-Time-Frequency Coded Mb-Ofdm Uwb, Le Chung Tran, Xiaojing Huang, Alfred Mertins, Eryk Dutkiewicz

Faculty of Informatics - Papers (Archive)

Cooperative communication has been intensively considered for general wireless and sensor networks. However, it has been almost untouched in Space-Time-Frequency Coded Multi-band OFDM Ultra-Wideband (STFC MB-OFDM UWB) systems. This paper thus proposes two cross-layer designs for cooperative communication, namely Simple Cooperative Communication Scheme (SCCS) and Advanced Cooperative Communication Scheme (ACCS), in slow fading scenarios. In the former, nodes always cooperate with one another despite the possibly erroneous reception at the partner nodes, while in the latter, nodes cooperate only in the case of successful reception. Simulations show that these schemes may considerably improve the performance of STFC MB-OFDM UWB without …